Windows CAB File on Disk
Spearphishing Attachment
Spearphishing Attachment
Hidden Window, Run Virtual Instance
Msiexec
Command and Scripting Interpreter
Command and Scripting Interpreter
SIP and Trust Provider Hijacking
Modify Registry
Local Groups
Fileless Storage, Obfuscated Files or Information
Impair Defenses, Disable or Modify Tools
Hidden Window
Impair Defenses, Disable or Modify System Firewall
Hidden Window
Virtualization/Sandbox Evasion, Time Based Evasion
Replication Through Removable Media
Ingress Tool Transfer
Ingress Tool Transfer
Rename System Utilities, Masquerading
Bypass User Account Control
Modify Registry
Phishing, Spearphishing Attachment
Phishing, Spearphishing Attachment
Phishing, Spearphishing Attachment
Phishing, Spearphishing Attachment
Phishing, Spearphishing Attachment
Phishing, Spearphishing Attachment
Phishing, Spearphishing Attachment
Phishing, Spearphishing Attachment
Process Injection
Process Injection
Masquerading, Trusted Developer Utilities Proxy Execution, Rename System Utilities, MSBuild
Process Injection
Process Injection
Masquerading, Trusted Developer Utilities Proxy Execution, Rename System Utilities
Command and Scripting Interpreter, Windows Command Shell, Windows Service, Create or Modify System Process
System Binary Proxy Execution, Rundll32
Abuse Elevation Control Mechanism
Process Injection
Server Software Component, Web Shell, Exploit Public-Facing Application, External Remote Services
Archive via Utility, Archive Collected Data
System Binary Proxy Execution, Rundll32
Modify Registry
Server Software Component, Web Shell, Exploit Public-Facing Application, External Remote Services
Masquerading, Trusted Developer Utilities Proxy Execution, Rename System Utilities, MSBuild
Modify Registry
System Binary Proxy Execution, Rundll32
Process Injection
Server Software Component, Web Shell
Server Software Component, Web Shell
System Binary Proxy Execution, Regsvr32
Steal or Forge Authentication Certificates, Ingress Tool Transfer
Steal or Forge Authentication Certificates, Archive Collected Data
System Shutdown/Reboot
PowerShell, Command and Scripting Interpreter
Obfuscated Files or Information, Fileless Storage
Permission Groups Discovery, Domain Groups
Scheduled Task, Command and Scripting Interpreter
Malicious File, Masquerade File Type
Remote Services, SMB/Windows Admin Shares, Distributed Component Object Model, Windows Management Instrumentation, Windows Service
Disable or Modify Tools, Impair Defenses
Remote System Discovery
Remote Services, SMB/Windows Admin Shares, Distributed Component Object Model, Windows Management Instrumentation, Windows Service
Masquerading
Create or Modify System Process
Domain Account, Account Discovery
Remote Services, SMB/Windows Admin Shares, Distributed Component Object Model, Windows Management Instrumentation, Windows Service
Service Stop
NTDS, OS Credential Dumping
Permission Groups Discovery, Local Groups
Account Access Removal
Windows Management Instrumentation
Account Access Removal
Service Stop
Registry Run Keys / Startup Folder, Boot or Logon Autostart Execution
File and Directory Permissions Modification
Windows File and Directory Permissions Modification, File and Directory Permissions Modification
File and Directory Permissions Modification
Exploit Public-Facing Application, External Remote Services
Internal Proxy, Proxy
Ingress Tool Transfer, Domain Groups
Internal Proxy, Proxy
Command and Scripting Interpreter, Exploit Public-Facing Application, External Remote Services
Kernel Modules and Extensions
Obfuscated Files or Information
Modify Registry
Pre-OS Boot, Registry Run Keys / Startup Folder
Disable or Modify Tools, Impair Defenses, Modify Registry
Active Setup, Boot or Logon Autostart Execution
Port Monitors, Boot or Logon Autostart Execution
Application Shimming, Event Triggered Execution
Inhibit System Recovery
Disable or Modify Tools, Impair Defenses
Data Destruction, File Deletion, Indicator Removal
Disable or Modify Tools, Impair Defenses, Modify Registry
Disable or Modify Tools, Impair Defenses
Disable or Modify Tools, Impair Defenses, Modify Registry
Modify Registry
Image File Execution Options Injection, Event Triggered Execution
Modify Registry
Registry Run Keys / Startup Folder, Boot or Logon Autostart Execution
Modify Registry
Data Destruction, File Deletion, Indicator Removal
Modify Registry
Data Destruction, File Deletion, Indicator Removal
Remote Services
Bypass User Account Control, Abuse Elevation Control Mechanism
Disable or Modify Tools, Impair Defenses
Indicator Blocking, Trusted Developer Utilities Proxy Execution, Impair Defenses
Disable or Modify Tools, Impair Defenses
Data Destruction, File Deletion, Indicator Removal
Disable or Modify Tools, Impair Defenses
Disable or Modify Tools, Impair Defenses
Disable or Modify Tools, Impair Defenses
Data Destruction, File Deletion, Indicator Removal
Disable or Modify Tools, Impair Defenses
Data Destruction, File Deletion, Indicator Removal
Hidden Files and Directories, Disable or Modify Tools, Hide Artifacts, Impair Defenses, Modify Registry
Disable or Modify Tools, Impair Defenses, Modify Registry
Disable or Modify Tools, Impair Defenses
Modify Registry
Install Root Certificate, Subvert Trust Controls
Time Providers, Boot or Logon Autostart Execution
Data Destruction
Modify Registry
Data Destruction, File Deletion, Indicator Removal
Modify Registry
Services Registry Permissions Weakness
Modify Registry
Disable or Modify Tools, Impair Defenses, Modify Registry
Disable or Modify Tools, Impair Defenses
Modify Registry
Modify Registry, OS Credential Dumping
Right-to-Left Override, Masquerading
Right-to-Left Override, Masquerading
Disable or Modify Tools, Impair Defenses
Domain Policy Modification, Group Policy Modification
Modify Registry
Modify Registry
Modify Registry
Modify Registry
Modify Registry
Modify Registry
Modify Registry
Modify Registry
Modify Registry
Modify Registry
Modify Registry
Masquerading, Rename System Utilities, System Binary Proxy Execution, InstallUtil
System Binary Proxy Execution, Regsvr32
Service Stop
PowerShell, Command and Scripting Interpreter
Security Account Manager, OS Credential Dumping
Unix Shell, Command and Scripting Interpreter
System Shutdown/Reboot
Indicator Removal
Disable or Modify System Firewall, Impair Defenses
Masquerading, Rename System Utilities, System Binary Proxy Execution, InstallUtil
Service Stop
Virtualization/Sandbox Evasion, Time Based Evasion
Command and Scripting Interpreter, PowerShell
Remote Services, Distributed Component Object Model, Windows Remote Management, Windows Management Instrumentation, Scheduled Task, Windows Service, PowerShe...
Command and Scripting Interpreter, PowerShell
Hardware Additions
Data Destruction
Scheduled Task/Job
Data Destruction
Exploitation for Privilege Escalation
Data Destruction
LSASS Memory, OS Credential Dumping
Exploit Public-Facing Application, External Remote Services
Disable or Modify Tools, Impair Defenses
File Deletion, Indicator Removal
Event Triggered Execution, Screensaver
System Network Configuration Discovery
Cron, Scheduled Task/Job
Boot or Logon Initialization Scripts, Logon Script (Windows)
Access Token Manipulation, Token Impersonation/Theft
Change Default File Association, Event Triggered Execution
Disable or Modify Tools, Impair Defenses
Data Destruction
Print Processors, Boot or Logon Autostart Execution
Process Injection, Create or Modify System Process, Parent PID Spoofing, Access Token Manipulation
Command and Scripting Interpreter, PowerShell, Ingress Tool Transfer
Modify Registry
Event Triggered Execution, Accessibility Features
Data Destruction
Systemd Timers, Scheduled Task/Job
Disable or Modify Tools, Impair Defenses
Disable or Modify System Firewall, Impair Defenses
Masquerade Task or Service, Masquerading
User Execution, Malicious File
Disable or Modify Tools, Impair Defenses
Disable or Modify Tools, Impair Defenses
Disable or Modify Tools, Impair Defenses
Disable or Modify Tools, Impair Defenses
Credentials in Registry, Unsecured Credentials
Scheduled Task, Scheduled Task/Job
Account Discovery, Local Account
System Owner/User Discovery
Scheduled Task, Scheduled Task/Job
Windows Command Shell, Command and Scripting Interpreter
Command and Scripting Interpreter, PowerShell, Ingress Tool Transfer
Compromise Software Supply Chain
Credentials in Registry, Unsecured Credentials
RDP Hijacking, Remote Service Session Hijacking, Windows Service
Abuse Elevation Control Mechanism
Remote Desktop Protocol, Remote Services
Scheduled Task
Lateral Tool Transfer
Create or Modify System Process, Windows Service
User Execution
Exfiltration Over Unencrypted Non-C2 Protocol
Unsecured Credentials, Group Policy Preferences
DLL Side-Loading, Hijack Execution Flow
Exfiltration Over Unencrypted Non-C2 Protocol
System Binary Proxy Execution, Regsvr32
Process Injection
Phishing, Spearphishing Attachment
Phishing, Spearphishing Attachment
Phishing, Spearphishing Attachment
Phishing, Spearphishing Attachment
Phishing, Spearphishing Attachment
Phishing, Spearphishing Attachment
Phishing, Spearphishing Attachment
Steal or Forge Authentication Certificates
Steal or Forge Authentication Certificates
Steal or Forge Authentication Certificates
Steal or Forge Authentication Certificates
Scheduled Task/Job, Scheduled Task
Spearphishing Attachment, Phishing
LSASS Memory
Command and Scripting Interpreter
Exploit Public-Facing Application, External Remote Services
Spearphishing Attachment, Phishing
Server Software Component, IIS Components
Modify Registry
Protocol Tunneling, Proxy, Web Service
Protocol Tunneling, Proxy, Web Service
Registry Run Keys / Startup Folder, Boot or Logon Autostart Execution
Malicious File, User Execution
Domain Account, Account Discovery
DLL Search Order Hijacking, Hijack Execution Flow
Disable Windows Event Logging, Impair Defenses, Server Software Component, IIS Components
Server Software Component, IIS Components
Query Registry
Query Registry
Windows Management Instrumentation
System Network Configuration Discovery
Change Default File Association, Event Triggered Execution
Credentials from Password Stores
Indirect Command Execution
System Network Connections Discovery
Credentials in Registry, Unsecured Credentials
Password Managers
Private Keys, Unsecured Credentials
Cached Domain Credentials, OS Credential Dumping
Security Support Provider, Boot or Logon Autostart Execution
System Information Discovery
System Owner/User Discovery
Steal or Forge Kerberos Tickets
BITS Jobs, Ingress Tool Transfer
Command and Scripting Interpreter
OS Credential Dumping
Modify Registry
Modify Registry
Disable or Modify Tools, Impair Defenses
Bypass User Account Control, Abuse Elevation Control Mechanism
Bypass User Account Control, Abuse Elevation Control Mechanism
Bypass User Account Control, Abuse Elevation Control Mechanism
Bypass User Account Control, Abuse Elevation Control Mechanism
File Deletion, Indicator Removal
Data Destruction
Modify Registry
Regsvr32, System Binary Proxy Execution
Command and Scripting Interpreter, JavaScript
Process Injection
Process Injection
System Owner/User Discovery
System Owner/User Discovery
DLL Side-Loading, Hijack Execution Flow
DLL Side-Loading, Hijack Execution Flow
Domain Account, Local Groups, Domain Trust Discovery, Local Account, Account Discovery, Domain Groups, Permission Groups Discovery
Component Object Model Hijacking, Event Triggered Execution
System Script Proxy Execution, System Binary Proxy Execution
Spearphishing Attachment, Phishing, Malicious Link, User Execution
Spearphishing Attachment, Phishing
Protocol Tunneling, SSH
Command and Scripting Interpreter
Modify Authentication Process
Account Manipulation
LSASS Memory, OS Credential Dumping
Compiled HTML File, System Binary Proxy Execution
Ingress Tool Transfer
Service Stop
Remote Access Software
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
DLL Search Order Hijacking
Ingress Tool Transfer
Proxy, Non-Application Layer Protocol
Ingress Tool Transfer
Ingress Tool Transfer
System Time Discovery
Clipboard Data
Windows Command Shell, Command and Scripting Interpreter
SSH Authorized Keys
System Shutdown/Reboot
System Shutdown/Reboot
System Information Discovery, Rootkit
Obfuscated Files or Information, Unix Shell
Obfuscated Files or Information
Disable or Modify Tools, Impair Defenses
Windows Management Instrumentation Event Subscription
Disable or Modify Tools, Impair Defenses
Screen Capture
Mavinject, System Binary Proxy Execution
Screen Capture
Odbcconf
Odbcconf
System Binary Proxy Execution
Exploit Public-Facing Application, External Remote Services
Odbcconf
Disable or Modify Tools, Impair Defenses
Remote Desktop Protocol, Remote Services
Modify Registry
Disable or Modify Tools, Impair Defenses
Service Stop
Modify Registry
Modify Registry
Remote Access Software
Modify Registry
Modify Registry
Modify Registry
Modify Registry
Remote Desktop Protocol, Remote Services
Remote Desktop Protocol, Remote Services
Remote Desktop Protocol, Remote Services
Msiexec
Disable or Modify Tools, Impair Defenses
Disable or Modify Tools, Impair Defenses
Disable or Modify Tools, Impair Defenses
Exploit Public-Facing Application, External Remote Services
Disable or Modify Tools, Impair Defenses
Command and Scripting Interpreter
Command and Scripting Interpreter
At, Scheduled Task/Job
At, Scheduled Task/Job
Scheduled Task, Scheduled Task/Job
Exploitation for Privilege Escalation
Windows Service, Create or Modify System Process, Exploitation for Privilege Escalation
Domain Trust Discovery
Scheduled Task, Impair Defenses
System Binary Proxy Execution, Mshta
System Binary Proxy Execution, Masquerading, Rundll32, Rename System Utilities
System Services, Service Execution
System Binary Proxy Execution, Compiled HTML File
Indirect Command Execution
Indirect Command Execution
File and Directory Permissions Modification
InstallUtil, System Binary Proxy Execution
InstallUtil, System Binary Proxy Execution
System Binary Proxy Execution, Regsvcs/Regasm
System Binary Proxy Execution, Regsvcs/Regasm
Use Alternate Authentication Material
Command and Scripting Interpreter
Process Injection
Windows Management Instrumentation
Bypass User Account Control, Abuse Elevation Control Mechanism
Dynamic-link Library Injection, System Binary Proxy Execution, Process Injection
System Binary Proxy Execution
System Binary Proxy Execution, Rundll32
Process Injection
Scheduled Task, Scheduled Task/Job
Ingress Tool Transfer
Ingress Tool Transfer
Use Alternate Authentication Material, Pass the Ticket, Steal or Forge Kerberos Tickets, Kerberoasting, AS-REP Roasting
Use Alternate Authentication Material, Pass the Ticket
Exploitation for Privilege Escalation
Obfuscated Files or Information
Windows Command Shell
SSH Authorized Keys, Account Manipulation
SSH Authorized Keys, Account Manipulation
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
/etc/passwd and /etc/shadow, OS Credential Dumping
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Setuid and Setgid, Abuse Elevation Control Mechanism
Dynamic Linker Hijacking, Hijack Execution Flow
Kernel Modules and Extensions, Boot or Logon Autostart Execution
Kernel Modules and Extensions, Boot or Logon Autostart Execution
Kernel Modules and Extensions, Boot or Logon Autostart Execution
Linux and Mac File and Directory Permissions Modification, File and Directory Permissions Modification
Setuid and Setgid, Abuse Elevation Control Mechanism
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Setuid and Setgid, Abuse Elevation Control Mechanism
Local Account, Create Account
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Systemd Timers, Scheduled Task/Job
Systemd Timers, Scheduled Task/Job
Unix Shell Configuration Modification, Event Triggered Execution
RC Scripts, Boot or Logon Initialization Scripts
Unix Shell Configuration Modification, Event Triggered Execution
Cron, Scheduled Task/Job
Cron, Scheduled Task/Job
Cron, Scheduled Task/Job
Cron, Scheduled Task/Job
Cron, Scheduled Task/Job
Ingress Tool Transfer
Ingress Tool Transfer
Disable or Modify Tools
Unix Shell
Automated Exfiltration
Remote Services, Distributed Component Object Model, MMC
Create or Modify System Process, Windows Service
Windows Management Instrumentation
Credentials from Web Browsers, Credentials from Password Stores
Remote Services, Windows Remote Management
Scheduled Task/Job, Scheduled Task
Gather Victim Host Information
Disable or Modify Tools, Impair Defenses
Remote Services, Windows Remote Management
Data Encrypted for Impact
Remote Services, Distributed Component Object Model
Windows Management Instrumentation
Compile After Delivery, Obfuscated Files or Information
System Network Configuration Discovery, Internet Connection Discovery
Windows Management Instrumentation
InstallUtil, System Binary Proxy Execution
Disable or Modify System Firewall, Impair Defenses
InstallUtil, System Binary Proxy Execution
Scheduled Task/Job, Scheduled Task
XSL Script Processing
Scheduled Task/Job, At
Remote Services, Windows Remote Management
Create or Modify System Process, Windows Service
Ingress Tool Transfer
Create or Modify System Process, Windows Service
Match Legitimate Name or Location, Masquerading, OS Credential Dumping, Active Scanning
Ingress Tool Transfer
Disable or Modify Tools, Impair Defenses
Kerberoasting
Clear Windows Event Logs, Indicator Removal
Data Destruction, File Deletion, Indicator Removal
Process Injection
Command and Scripting Interpreter, Component Object Model
Modify Registry
Regsvr32, Modify Registry
MSBuild, Trusted Developer Utilities Proxy Execution
Visual Basic, Command and Scripting Interpreter
Verclsid, System Binary Proxy Execution
Screen Capture
BITS Jobs
NTDS, OS Credential Dumping
NTDS, OS Credential Dumping
Disable or Modify System Firewall, Impair Defenses
System Binary Proxy Execution, Mshta
System Binary Proxy Execution, Mshta
System Binary Proxy Execution, Compiled HTML File
Automated Exfiltration
Install Root Certificate, Subvert Trust Controls
Account Discovery, Local Account
Account Discovery, Local Account
Archive via Utility, Archive Collected Data
NTDS, OS Credential Dumping
Remote Services, SMB/Windows Admin Shares
Archive via Utility, Archive Collected Data
System Binary Proxy Execution, Compiled HTML File
System Owner/User Discovery
Permission Groups Discovery, Local Groups
Permission Groups Discovery, Local Groups
Permission Groups Discovery, Local Groups
System Owner/User Discovery
System Owner/User Discovery
System Owner/User Discovery
XSL Script Processing
Command and Scripting Interpreter, JavaScript
System Network Connections Discovery
System Network Connections Discovery
System Network Connections Discovery
Security Account Manager, OS Credential Dumping
System Binary Proxy Execution, Rundll32
Local Account, Create Account
System Binary Proxy Execution, Rundll32
System Binary Proxy Execution, Control Panel
Remote System Discovery
Remote System Discovery
System Information Discovery
Remote System Discovery
Remote System Discovery
Inhibit System Recovery
Inhibit System Recovery
Domain Trust Discovery
Permission Groups Discovery, Domain Groups
Remote System Discovery
Remote System Discovery
Remote System Discovery
Remote System Discovery
Remote System Discovery
Password Policy Discovery
Password Policy Discovery
Phishing, Spearphishing Link
Password Policy Discovery
Password Policy Discovery
System Network Connections Discovery
Permission Groups Discovery, Domain Groups
Permission Groups Discovery, Domain Groups
Permission Groups Discovery, Domain Groups
Permission Groups Discovery, Domain Groups
Permission Groups Discovery, Domain Groups
Permission Groups Discovery, Domain Groups
Domain Account, Account Discovery
Domain Account, Account Discovery
Domain Trust Discovery
Domain Account, Account Discovery
Domain Account, Account Discovery
Domain Account, Account Discovery
Account Discovery, Local Account
Security Account Manager, OS Credential Dumping
Archive via Utility, Archive Collected Data
Indicator Removal
System Binary Proxy Execution, Rundll32
Msiexec, System Binary Proxy Execution
System Binary Proxy Execution, Regsvr32
Command and Scripting Interpreter
System Binary Proxy Execution, Rundll32
System Binary Proxy Execution, Rundll32
System Binary Proxy Execution, Mshta
Print Processors, Boot or Logon Autostart Execution
Print Processors, Boot or Logon Autostart Execution
Disable or Modify Tools, Impair Defenses
Disable or Modify Cloud Firewall, Impair Defenses
Disable or Modify Cloud Firewall, Impair Defenses
Command and Scripting Interpreter, Visual Basic
File and Directory Permissions Modification
File Deletion, Indicator Removal
Inhibit System Recovery
Indicator Removal, Clear Windows Event Logs
Command and Scripting Interpreter
User Execution
User Execution
Domain Account, Local Groups, Domain Trust Discovery, Local Account, Account Discovery, Domain Groups, Permission Groups Discovery
Domain Account, Local Groups, Domain Trust Discovery, Local Account, Account Discovery, Domain Groups, Permission Groups Discovery
Domain Account, Local Groups, Domain Trust Discovery, Local Account, Account Discovery, Domain Groups, Permission Groups Discovery
Domain Account, Local Groups, Domain Trust Discovery, Local Account, Account Discovery, Domain Groups, Permission Groups Discovery
Exploit Public-Facing Application
Bypass User Account Control, Abuse Elevation Control Mechanism
Bypass User Account Control, Abuse Elevation Control Mechanism
File and Directory Permissions Modification
Disable or Modify Tools, Impair Defenses
Account Access Removal
Service Stop
Service Stop
Disable or Modify Tools, Impair Defenses
Phishing, Spearphishing Attachment
Command and Scripting Interpreter
Exfiltration Over Alternative Protocol
Phishing, Spearphishing Attachment
Phishing, Spearphishing Attachment
Security Account Manager, OS Credential Dumping
Security Account Manager, OS Credential Dumping
Domain Trust Discovery
Disable or Modify Tools, Impair Defenses
BITS Jobs
Deobfuscate/Decode Files or Information
Inhibit System Recovery
Command and Scripting Interpreter, PowerShell
Modify Registry, Bypass User Account Control, Abuse Elevation Control Mechanism
Scheduled Task, Scheduled Task/Job
Command and Scripting Interpreter, Windows Command Shell
Data Staged
Launch Agent, Create or Modify System Process
Ingress Tool Transfer
System Binary Proxy Execution, Regsvcs/Regasm
System Binary Proxy Execution, Regsvcs/Regasm
System Binary Proxy Execution, Compiled HTML File
System Binary Proxy Execution, Rundll32
System Binary Proxy Execution, Rundll32
System Binary Proxy Execution, Rundll32
System Binary Proxy Execution, Rundll32
NTDS, OS Credential Dumping
Inhibit System Recovery
System Binary Proxy Execution, Mshta
System Binary Proxy Execution, Mshta
PowerShell
Trusted Developer Utilities Proxy Execution, MSBuild
Trusted Developer Utilities Proxy Execution
System Binary Proxy Execution, Mshta
Inhibit System Recovery
User Execution, Malicious File
Masquerading, Rename System Utilities
Application Shimming, Event Triggered Execution
Scheduled Task, Scheduled Task/Job
Services Registry Permissions Weakness, Hijack Execution Flow
Disable or Modify System Firewall
Application Shimming, Event Triggered Execution
Rename System Utilities
Bypass User Account Control, Abuse Elevation Control Mechanism
Masquerading, Rename System Utilities
Command and Scripting Interpreter, Windows Command Shell
System Network Configuration Discovery
Inhibit System Recovery
Data Destruction
Windows Command Shell
Service Stop
Data Encrypted for Impact
Indicator Removal, Network Share Connection Removal
Masquerading
Modify Registry
Malicious File
Change Default File Association
Remote Desktop Protocol, Remote Services
Windows Service, Create or Modify System Process
Command and Scripting Interpreter, Windows Command Shell
PowerShell, Windows Command Shell
Command and Scripting Interpreter, PowerShell
Email Collection, Local Email Collection
File and Directory Permissions Modification, Windows File and Directory Permissions Modification
Software Deployment Tools
Scheduled Task
Path Interception by Unquoted Path, Hijack Execution Flow
Exploitation for Privilege Escalation
Windows Management Instrumentation
Windows Management Instrumentation
NTDS, OS Credential Dumping
System Information Discovery
Hidden Files and Directories
Data Encrypted for Impact
Indicator Removal