Splunk RCE via User XSLT
Exploitation of Remote Services
Exploitation of Remote Services
Exploitation of Remote Services
Drive-by Compromise
Malicious Image, User Execution
Malicious Image, User Execution
Malicious Image, User Execution
Malicious Image, User Execution
Spearphishing Attachment
Compromise Accounts, Cloud Accounts, Brute Force, Password Spraying, Credential Stuffing
Hidden Window, Run Virtual Instance
Multi-Factor Authentication Request Generation
Msiexec
Command and Scripting Interpreter
Command and Scripting Interpreter
Account Manipulation, Device Registration
Steal Application Access Token
Malicious Image, User Execution
Steal Application Access Token
Steal Application Access Token
Impair Defenses
Valid Accounts
Exploit Public-Facing Application
Exploit Public-Facing Application
Exploit Public-Facing Application
Exploit Public-Facing Application
SIP and Trust Provider Hijacking
SIP and Trust Provider Hijacking
SIP and Trust Provider Hijacking
Steal or Forge Kerberos Tickets
Exploit Public-Facing Application
Exploit Public-Facing Application
Exploit Public-Facing Application
Exploitation for Privilege Escalation
Modify Registry
Proxy, Multi-hop Proxy
Web Service
Local Groups
Account Manipulation, Additional Cloud Roles
Fileless Storage, Obfuscated Files or Information
Impair Defenses, Disable or Modify Tools
Shared Modules
Hidden Window
Impair Defenses, Disable or Modify System Firewall
Hidden Window
Virtualization/Sandbox Evasion, Time Based Evasion
Replication Through Removable Media
Network Denial of Service
File and Directory Discovery
Drive-by Compromise
Account Discovery, Domain Account
Account Discovery, Domain Account
Account Discovery, Domain Account
Account Discovery, Domain Account
Abuse Elevation Control Mechanism, Indirect Command Execution
Application or System Exploitation
Ingress Tool Transfer
Exploit Public-Facing Application, Ingress Tool Transfer, Command and Scripting Interpreter
Ingress Tool Transfer
Exploit Public-Facing Application
Exploit Public-Facing Application
Exploit Public-Facing Application
Rename System Utilities, Masquerading
Mark-of-the-Web Bypass
Exploit Public-Facing Application, External Remote Services
Steal Application Access Token, Phishing, Spearphishing Link
Cloud Account, Create Account
Modify Authentication Process
Cloud Account, Create Account
Exploit Public-Facing Application, External Remote Services
Bypass User Account Control
DLL Side-Loading
Exploit Public-Facing Application
Modify Registry
Exploit Public-Facing Application
Exploit Public-Facing Application
Phishing, Spearphishing Attachment
Phishing, Spearphishing Attachment
Phishing, Spearphishing Attachment
Phishing, Spearphishing Attachment
Phishing, Spearphishing Attachment
Cloud Account, Create Account
Phishing, Spearphishing Attachment
Phishing, Spearphishing Attachment
Phishing, Spearphishing Attachment
Phishing, Spearphishing Attachment
Process Injection
Process Injection
Masquerading, Trusted Developer Utilities Proxy Execution, Rename System Utilities, MSBuild
Process Injection
Process Injection
Masquerading, Trusted Developer Utilities Proxy Execution, Rename System Utilities
Command and Scripting Interpreter, Windows Command Shell, Windows Service, Create or Modify System Process
System Binary Proxy Execution, Rundll32
Exploit Public-Facing Application, External Remote Services
Abuse Elevation Control Mechanism
Exploit Public-Facing Application, External Remote Services
Process Injection
Server Software Component, Web Shell, Exploit Public-Facing Application, External Remote Services
Archive via Utility, Archive Collected Data
System Binary Proxy Execution, Rundll32
Modify Registry
Server Software Component, Web Shell, Exploit Public-Facing Application, External Remote Services
Process Injection
Masquerading, Trusted Developer Utilities Proxy Execution, Rename System Utilities, MSBuild
Command and Scripting Interpreter, PowerShell
Modify Registry
System Binary Proxy Execution, Rundll32
Command and Scripting Interpreter, PowerShell
Process Injection
Exploit Public-Facing Application, External Remote Services
Server Software Component, Web Shell
Server Software Component, Web Shell
System Binary Proxy Execution, Regsvr32
Steal or Forge Authentication Certificates, Command and Scripting Interpreter, PowerShell
Steal or Forge Authentication Certificates, Ingress Tool Transfer
Steal or Forge Authentication Certificates, Archive Collected Data
External Remote Services, Exploit Public-Facing Application, Exploitation of Remote Services, Exploitation for Privilege Escalation
System Shutdown/Reboot
PowerShell, Command and Scripting Interpreter
Obfuscated Files or Information, Fileless Storage
Process Injection, Portable Executable Injection
Modify Registry
Query Registry, System Network Connections Discovery, Permission Groups Discovery, System Network Configuration Discovery, OS Credential Dumping, System Info...
File and Directory Permissions Modification, System Network Connections Discovery, System Owner/User Discovery, System Shutdown/Reboot, System Network Config...
Command and Scripting Interpreter, PowerShell
Remote Services, SMB/Windows Admin Shares
Permission Groups Discovery, Domain Groups
Scheduled Task, Command and Scripting Interpreter
Malicious File, Masquerade File Type
Remote Services, SMB/Windows Admin Shares, Distributed Component Object Model, Windows Management Instrumentation, Windows Service
Disable or Modify Tools, Impair Defenses
Remote System Discovery
Remote Services, SMB/Windows Admin Shares, Distributed Component Object Model, Windows Management Instrumentation, Windows Service
Disk Structure Wipe, Disk Wipe
Masquerading
Create or Modify System Process
Domain Account, Account Discovery
Account Discovery, Domain Account, User Execution, Malicious File
Remote Services, SMB/Windows Admin Shares, Distributed Component Object Model, Windows Management Instrumentation, Windows Service
Service Stop
Disk Structure Wipe, Disk Wipe
Security Account Manager, OS Credential Dumping
NTDS, OS Credential Dumping
Permission Groups Discovery, Local Groups
PowerShell, Ingress Tool Transfer
Account Access Removal
Windows Management Instrumentation
Account Access Removal
Service Stop
PowerShell, Ingress Tool Transfer, Fileless Storage
Scheduled Task, PowerShell, Command and Scripting Interpreter
Registry Run Keys / Startup Folder, Boot or Logon Autostart Execution
File and Directory Permissions Modification
Windows File and Directory Permissions Modification, File and Directory Permissions Modification
File and Directory Permissions Modification
Account Manipulation
Compromise Accounts, Cloud Accounts, Multi-Factor Authentication Request Generation, Modify Authentication Process, Multi-Factor Authentication
Cloud Service Discovery
Account Discovery, Domain Account
Exploit Public-Facing Application, External Remote Services
Account Discovery, Domain Account
Disable or Modify Cloud Logs, Impair Defenses
Disable or Modify Cloud Logs, Impair Defenses
Impair Defenses, Disable or Modify Cloud Logs
Steal or Forge Authentication Certificates, Use Alternate Authentication Material
Steal or Forge Authentication Certificates
Internal Proxy, Proxy
Ingress Tool Transfer, Domain Groups
Internal Proxy, Proxy
Network Share Discovery
Browser Session Hijacking
Domain Policy Modification
Abuse Elevation Control Mechanism
Password Policy Discovery
Modify Authentication Process, Multi-Factor Authentication
Command and Scripting Interpreter, Exploit Public-Facing Application, External Remote Services
Exploit Public-Facing Application, External Remote Services
Exploit Public-Facing Application, External Remote Services
Kernel Modules and Extensions, Service Execution
Kernel Modules and Extensions
Obfuscated Files or Information
Modify Registry
Transfer Data to Cloud Account
Pre-OS Boot, Registry Run Keys / Startup Folder
Steal or Forge Authentication Certificates
Inhibit System Recovery
Transfer Data to Cloud Account
Account Manipulation, Additional Cloud Roles
Disable or Modify Tools, Impair Defenses, Modify Registry
Active Setup, Boot or Logon Autostart Execution
Port Monitors, Boot or Logon Autostart Execution
Application Shimming, Event Triggered Execution
Inhibit System Recovery
Disable or Modify Tools, Impair Defenses
Data Destruction, File Deletion, Indicator Removal
Disable or Modify Tools, Impair Defenses, Modify Registry
Disable or Modify Tools, Impair Defenses
Disable or Modify Tools, Impair Defenses, Modify Registry
Modify Registry
Image File Execution Options Injection, Event Triggered Execution
Modify Registry
Registry Run Keys / Startup Folder, Boot or Logon Autostart Execution
Modify Registry
Data Destruction, File Deletion, Indicator Removal
Modify Registry
Data Destruction, File Deletion, Indicator Removal
Remote Services
Bypass User Account Control, Abuse Elevation Control Mechanism
Exfiltration Over Unencrypted Non-C2 Protocol
Disable or Modify Tools, Impair Defenses
Indicator Blocking, Trusted Developer Utilities Proxy Execution, Impair Defenses
Disable or Modify Tools, Impair Defenses
Data Destruction, File Deletion, Indicator Removal
Disable or Modify Tools, Impair Defenses
Disable or Modify Tools, Impair Defenses
Disable or Modify Tools, Impair Defenses
Data Destruction, File Deletion, Indicator Removal
Disable or Modify Tools, Impair Defenses
Data Destruction, File Deletion, Indicator Removal
Hidden Files and Directories, Disable or Modify Tools, Hide Artifacts, Impair Defenses, Modify Registry
Disable or Modify Tools, Impair Defenses, Modify Registry
Disable or Modify Tools, Impair Defenses
Modify Registry
Install Root Certificate, Subvert Trust Controls
Time Providers, Boot or Logon Autostart Execution
Data Destruction
Modify Registry
Data Destruction, File Deletion, Indicator Removal
Modify Registry
Services Registry Permissions Weakness
Modify Registry
Disable or Modify Tools, Impair Defenses, Modify Registry
Disable or Modify Tools, Impair Defenses
Modify Registry
Modify Registry, OS Credential Dumping
Account Manipulation, Additional Cloud Roles
Account Manipulation, Additional Cloud Roles
Right-to-Left Override, Masquerading
Right-to-Left Override, Masquerading
Account Manipulation, Additional Cloud Roles
Credentials from Password Stores, Credentials from Web Browsers
Security Account Manager
Disable or Modify Tools, Impair Defenses
Credentials from Password Stores, Credentials from Web Browsers
Query Registry
Query Registry
Disable or Modify Tools, Impair Defenses
Domain Policy Modification, Group Policy Modification
Automated Collection
Modify Registry
Modify Registry
Modify Registry
Modify Registry
Modify Registry
Modify Registry
Modify Registry
Modify Registry
Modify Registry
Modify Registry
Service Stop
Modify Registry
Domain Accounts, Permission Groups Discovery
Exploitation of Remote Services
RDP Hijacking
Masquerading, Rename System Utilities, System Binary Proxy Execution, InstallUtil
Indicator Removal
System Binary Proxy Execution, Regsvr32
Service Stop
PowerShell, Command and Scripting Interpreter
Security Account Manager, OS Credential Dumping
Unix Shell, Command and Scripting Interpreter
System Shutdown/Reboot
Command and Scripting Interpreter, PowerShell
Indicator Removal
Domain Account, Account Discovery
Disable or Modify System Firewall, Impair Defenses
Masquerading, Rename System Utilities, System Binary Proxy Execution, InstallUtil
Service Stop
Service Stop
Virtualization/Sandbox Evasion, Time Based Evasion
Command and Scripting Interpreter, PowerShell
DLL Side-Loading, Hijack Execution Flow
Remote Services, Distributed Component Object Model, Windows Remote Management, Windows Management Instrumentation, Scheduled Task, Windows Service, PowerShe...
PowerShell, Command and Scripting Interpreter
Command and Scripting Interpreter, PowerShell
Hardware Additions
Data Destruction
Command and Scripting Interpreter, PowerShell
Scheduled Task/Job
Gather Victim Host Information
Data Destruction
Data Destruction
Obfuscated Files or Information, Indicator Removal from Tools
Disable or Modify Tools, Impair Defenses
Exploitation for Privilege Escalation
Command and Scripting Interpreter, Process Injection, PowerShell
Impair Defenses, PowerShell, Command and Scripting Interpreter
Data Destruction
Disable or Modify Tools, Impair Defenses
LSASS Memory, OS Credential Dumping
Domain Account, Account Discovery
Exploit Public-Facing Application, External Remote Services
Disable or Modify Tools, Impair Defenses
Disable or Modify Tools, Impair Defenses
File Deletion, Indicator Removal
Component Object Model Hijacking, Event Triggered Execution, PowerShell
Steal or Forge Kerberos Tickets, Kerberoasting
Event Triggered Execution, Screensaver
System Network Configuration Discovery
Cron, Scheduled Task/Job
Domain Account, Account Discovery
System Firmware, Pre-OS Boot
Visual Basic, Command and Scripting Interpreter
Boot or Logon Initialization Scripts, Logon Script (Windows)
Access Token Manipulation, Token Impersonation/Theft
Spearphishing Attachment, Phishing
Change Default File Association, Event Triggered Execution
Data Destruction
Disable or Modify Tools, Impair Defenses
Visual Basic, Command and Scripting Interpreter
Data Destruction
Data Destruction
Gather Victim Host Information
Print Processors, Boot or Logon Autostart Execution
Process Injection, Create or Modify System Process, Parent PID Spoofing, Access Token Manipulation
Command and Scripting Interpreter, PowerShell, Ingress Tool Transfer
Modify Registry
Event Triggered Execution, Accessibility Features
Data Destruction
Command and Scripting Interpreter, PowerShell
Scheduled Task/Job
Systemd Timers, Scheduled Task/Job
Gather Victim Host Information, PowerShell
Disable or Modify Tools, Impair Defenses
Disable or Modify System Firewall, Impair Defenses
Masquerade Task or Service, Masquerading
User Execution, Malicious File
Disable or Modify Tools, Impair Defenses
Disable or Modify Tools, Impair Defenses
Disable or Modify Tools, Impair Defenses
Disable or Modify Tools, Impair Defenses
Credentials in Registry, Unsecured Credentials
Automated Collection
Automated Collection
Domain Policy Modification, Group Policy Modification
Account Manipulation
Scheduled Task, Scheduled Task/Job
Account Discovery, Local Account
Scheduled Task
Command and Scripting Interpreter, Obfuscated Files or Information, PowerShell
System Owner/User Discovery
Command and Scripting Interpreter, PowerShell
Scheduled Task, Scheduled Task/Job
Account Discovery, Local Account, PowerShell
Screen Capture
Scheduled Task, Scheduled Task/Job
Exfiltration Over C2 Channel
Windows Command Shell, Command and Scripting Interpreter
Scheduled Task/Job
Command and Scripting Interpreter, PowerShell, Ingress Tool Transfer
Scheduled Task, Scheduled Task/Job
Exfiltration Over C2 Channel
Transfer Data to Cloud Account
Compromise Software Supply Chain
Compromise Software Supply Chain
Compromise Software Supply Chain
Credentials in Registry, Unsecured Credentials
RDP Hijacking, Remote Service Session Hijacking, Windows Service
Domain Policy Modification, Group Policy Modification
Abuse Elevation Control Mechanism
Remote Desktop Protocol, Remote Services
Domain Policy Modification, Group Policy Modification
Account Discovery, SMB/Windows Admin Shares, Network Share Discovery
PowerShell, Command and Scripting Interpreter
Domain Policy Modification, Group Policy Modification, Domain Accounts
Scheduled Task
PowerShell
Network Share Discovery
Security Account Manager
Transfer Data to Cloud Account
Windows Management Instrumentation
PowerShell, Command and Scripting Interpreter
Brute Force, Credential Stuffing
Windows Management Instrumentation
Lateral Tool Transfer
Network Share Discovery
Network Share Discovery, Valid Accounts
Transfer Data to Cloud Account
Create or Modify System Process, Windows Service
Windows Service, Create or Modify System Process
Multi-Factor Authentication Request Generation
Steal Web Session Cookie
User Execution
Web Session Cookie, Cloud Service Dashboard
Exfiltration Over Unencrypted Non-C2 Protocol
Unsecured Credentials, Group Policy Preferences
Unsecured Credentials, Group Policy Preferences
DLL Side-Loading, Hijack Execution Flow
Exfiltration Over Unencrypted Non-C2 Protocol
Valid Accounts, Default Accounts, Modify Authentication Process
Valid Accounts, Default Accounts, Credential Stuffing
Valid Accounts, Default Accounts, Password Spraying
System Services, Service Execution
System Binary Proxy Execution, Regsvr32
Rootkit, Exploitation for Privilege Escalation
Process Injection, Portable Executable Injection
Process Injection
Exploit Public-Facing Application, External Remote Services
Phishing, Spearphishing Attachment
Phishing, Spearphishing Attachment
Phishing, Spearphishing Attachment
Phishing, Spearphishing Attachment
Phishing, Spearphishing Attachment
Spearphishing Attachment, Phishing
Phishing, Spearphishing Attachment
Phishing, Spearphishing Attachment
Drive-by Compromise
Drive-by Compromise
Drive-by Compromise
Private Keys, Unsecured Credentials, Steal or Forge Authentication Certificates
Steal or Forge Authentication Certificates
Phishing, Spearphishing Attachment
Drive-by Compromise
Drive-by Compromise
Steal or Forge Authentication Certificates
Steal or Forge Authentication Certificates
Steal or Forge Authentication Certificates
Steal or Forge Authentication Certificates
Steal or Forge Authentication Certificates
Exploitation for Privilege Escalation
Private Keys, Unsecured Credentials, Steal or Forge Authentication Certificates
Steal or Forge Authentication Certificates
Private Keys, Unsecured Credentials, Steal or Forge Authentication Certificates
Browser Session Hijacking
Steal or Forge Authentication Certificates
Modify Authentication Process, Multi-Factor Authentication
Brute Force, Password Spraying, Credential Stuffing
Modify Authentication Process, Multi-Factor Authentication
Password Policy Discovery
Disable or Modify Tools
PowerShell, Command and Scripting Interpreter
Rogue Domain Controller
Password Policy Discovery
Scheduled Task/Job, Scheduled Task
Brute Force, Password Guessing, Password Spraying
Phishing, Spearphishing Attachment
Browser Session Hijacking
Spearphishing Attachment, Phishing
Brute Force, Password Guessing, Password Spraying
LSASS Memory
Command and Scripting Interpreter
Brute Force, Password Guessing
Exploit Public-Facing Application, External Remote Services
Web Shell, Server Software Component, Exploit Public-Facing Application, External Remote Services
Compromise Accounts, Unused/Unsupported Cloud Regions
Domain Generation Algorithms
Server Software Component, IIS Components
Spearphishing Attachment, Phishing
Server Software Component, IIS Components
Modify Registry
Domain Generation Algorithms
Protocol Tunneling, Proxy, Web Service
Protocol Tunneling, Proxy, Web Service
Registry Run Keys / Startup Folder, Boot or Logon Autostart Execution
Malicious File, User Execution
Domain Account, Account Discovery
DLL Search Order Hijacking, Hijack Execution Flow
DLL Search Order Hijacking, Hijack Execution Flow
Server Software Component, IIS Components
Impair Defenses, Disable Windows Event Logging, Server Software Component, IIS Components
Disable Windows Event Logging, Impair Defenses, Server Software Component, IIS Components
DNS, Application Layer Protocol
Server Software Component, IIS Components
IIS Components, Server Software Component
Server Software Component, IIS Components
Server Software Component, IIS Components
Query Registry
Query Registry
Windows Service
Windows Management Instrumentation
System Network Configuration Discovery
Change Default File Association, Event Triggered Execution
Credentials from Password Stores
Indirect Command Execution
System Network Connections Discovery
Clipboard Data
Credentials in Registry, Unsecured Credentials
Password Managers
Private Keys, Unsecured Credentials
Cached Domain Credentials, OS Credential Dumping
Security Support Provider, Boot or Logon Autostart Execution
System Information Discovery
System Owner/User Discovery
Steal or Forge Kerberos Tickets
BITS Jobs, Ingress Tool Transfer
OS Credential Dumping, DCSync, Rogue Domain Controller
Command and Scripting Interpreter, PowerShell
Command and Scripting Interpreter
Account Manipulation
Domain Policy Modification
Account Manipulation
DCSync, OS Credential Dumping
SID-History Injection, Access Token Manipulation
OS Credential Dumping
Protocol Tunneling, Proxy, Web Service
Access Token Manipulation, SID-History Injection
Windows Management Instrumentation
Event Triggered Execution
Modify Registry
Modify Registry
Disable or Modify Tools, Impair Defenses
Bypass User Account Control, Abuse Elevation Control Mechanism
Bypass User Account Control, Abuse Elevation Control Mechanism
Bypass User Account Control, Abuse Elevation Control Mechanism
Bypass User Account Control, Abuse Elevation Control Mechanism
System Services, Service Execution
Domain Account, Account Discovery
File Deletion, Indicator Removal
Data Encrypted for Impact
Data Destruction
Application Layer Protocol
Modify Registry
Encrypted Channel
Exfiltration Over Web Service
Encrypted Channel
Dynamic-link Library Injection, Process Injection
Application Layer Protocol
Regsvr32, System Binary Proxy Execution
Command and Scripting Interpreter, JavaScript
Process Injection
Process Injection
Windows Management Instrumentation
DLL Side-Loading, Hijack Execution Flow
System Owner/User Discovery
System Owner/User Discovery
DLL Side-Loading, Hijack Execution Flow
DLL Side-Loading, Hijack Execution Flow
Rogue Domain Controller
Compromise Accounts, Cloud Accounts, Multi-Factor Authentication Request Generation, Valid Accounts, Cloud Accounts
Exploit Public-Facing Application, External Remote Services
Compromise Accounts, Cloud Accounts, Brute Force, Password Spraying, Credential Stuffing
Compromise Accounts, Cloud Accounts, Brute Force, Password Spraying, Credential Stuffing
Compromise Accounts, Cloud Accounts, Modify Authentication Process, Multi-Factor Authentication
Compromise Accounts, Cloud Accounts, Valid Accounts, Cloud Accounts
Compromise Accounts, Cloud Accounts, Valid Accounts, Cloud Accounts, Multi-Factor Authentication Request Generation
Drive-by Compromise
Exploitation of Remote Services
Exploitation of Remote Services
Drive-by Compromise
Drive-by Compromise
Domain Account, Local Groups, Domain Trust Discovery, Local Account, Account Discovery, Domain Groups, Permission Groups Discovery
Local Account, Create Account
Compromise Accounts, Cloud Accounts, Valid Accounts, Cloud Accounts
Compromise Accounts, Cloud Accounts, Multi-Factor Authentication Request Generation, Modify Authentication Process, Multi-Factor Authentication
Compromise Accounts, Cloud Accounts, Multi-Factor Authentication Request Generation
Compromise Accounts, Cloud Accounts, Multi-Factor Authentication Request Generation
Valid Accounts, Brute Force
Brute Force
Brute Force
Brute Force, Password Spraying, Credential Stuffing
Component Object Model Hijacking, Command and Scripting Interpreter, PowerShell
Component Object Model Hijacking, Event Triggered Execution
System Script Proxy Execution, System Binary Proxy Execution
Compromise Accounts, Cloud Accounts, Brute Force, Password Spraying, Credential Stuffing
Password Spraying, Brute Force
Password Spraying, Brute Force
Password Spraying, Brute Force
Password Spraying, Brute Force
Password Spraying, Brute Force
Password Spraying, Brute Force
Password Spraying, Brute Force
Password Spraying, Brute Force
Brute Force
Valid Accounts, Default Accounts
Valid Accounts, Default Accounts
Valid Accounts, Default Accounts
Valid Accounts, Default Accounts
Valid Accounts, Default Accounts
Valid Accounts, Default Accounts
Spearphishing Attachment, Phishing, Malicious Link, User Execution
Spearphishing Attachment, Phishing
Valid Accounts, Default Accounts
Mail Protocols, Application Layer Protocol
Mail Protocols, Application Layer Protocol
Mail Protocols, Application Layer Protocol
Protocol Tunneling, SSH
Data Encrypted for Impact
Command and Scripting Interpreter
Domain Account, Account Discovery
SID-History Injection, Access Token Manipulation
Ingress Tool Transfer, Exploit Public-Facing Application, Command and Scripting Interpreter, External Remote Services
SID-History Injection, Access Token Manipulation
Modify Authentication Process
Ingress Tool Transfer, Exploit Public-Facing Application, Command and Scripting Interpreter, External Remote Services
Image File Execution Options Injection
Account Manipulation
Rogue Domain Controller
DCSync, OS Credential Dumping
Account Manipulation
Domain Policy Modification, Domain Trust Modification
Rogue Domain Controller
Domain Policy Modification, Domain Trust Modification
Account Manipulation
LSASS Memory, OS Credential Dumping
Compiled HTML File, System Binary Proxy Execution
Abuse Elevation Control Mechanism
Account Manipulation
Ingress Tool Transfer
Account Manipulation, Additional Cloud Roles
Account Manipulation
Process Injection
InstallUtil, System Binary Proxy Execution
Valid Accounts, Domain Accounts
Compromise Accounts, Cloud Accounts, Unused/Unsupported Cloud Regions
Valid Accounts, Local Accounts
Compromise Accounts, Cloud Accounts, Unused/Unsupported Cloud Regions
Compromise Accounts, Cloud Accounts, Multi-Factor Authentication Request Generation, Valid Accounts, Cloud Accounts
Compromise Accounts, Cloud Accounts, Unused/Unsupported Cloud Regions
LSASS Memory, OS Credential Dumping
Token Impersonation/Theft, Access Token Manipulation
Service Stop
Token Impersonation/Theft, Access Token Manipulation
Credentials, Gather Victim Identity Information
DLL Search Order Hijacking, Hijack Execution Flow
Remote Access Software, OS Credential Dumping
Create Process with Token, Access Token Manipulation
Process Injection, Portable Executable Injection
GUI Input Capture, Input Capture
Valid Accounts, Cloud Accounts
Remote Access Software
Create Account, Cloud Account
Cloud Account
Create Account, Cloud Account
Cloud Account
Account Manipulation, Additional Cloud Credentials
Additional Cloud Roles
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Compromise Accounts, Cloud Accounts, Brute Force, Password Guessing
Compromise Accounts, Cloud Accounts, Modify Authentication Process, Multi-Factor Authentication
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Compromise Accounts, Cloud Accounts, Brute Force, Password Guessing
Compromise Accounts, Cloud Accounts, Brute Force
Account Discovery
Endpoint Denial of Service
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
LSASS Memory, OS Credential Dumping
DLL Search Order Hijacking
Ingress Tool Transfer
Proxy, Non-Application Layer Protocol
Ingress Tool Transfer
Ingress Tool Transfer
Hardware, Gather Victim Host Information
System Time Discovery
Clipboard Data
Windows Command Shell, Command and Scripting Interpreter
SSH Authorized Keys
System Shutdown/Reboot
System Shutdown/Reboot
System Information Discovery, Rootkit
Obfuscated Files or Information, Unix Shell
Obfuscated Files or Information
Disable or Modify Cloud Logs, Impair Defenses
Disable or Modify Cloud Logs, Impair Defenses
Disable or Modify Tools, Impair Defenses
Impair Defenses, Disable or Modify Cloud Logs
Impair Defenses, Disable or Modify Cloud Logs
Windows Management Instrumentation Event Subscription
Disable or Modify Tools, Impair Defenses
Compromise Accounts, Cloud Accounts, Valid Accounts, Cloud Accounts, Multi-Factor Authentication Request Generation
Disable or Modify Cloud Logs, Impair Defenses
Compromise Accounts, Cloud Accounts, Valid Accounts, Cloud Accounts
Compromise Accounts, Cloud Accounts, Valid Accounts, Cloud Accounts
Web Shell, Server Software Component, Exploit Public-Facing Application, External Remote Services
Compromise Accounts, Cloud Accounts, Brute Force, Password Spraying, Credential Stuffing
Disable or Modify Cloud Logs, Impair Defenses
Compromise Accounts, Cloud Accounts, Brute Force, Password Spraying, Credential Stuffing
Compromise Accounts, Cloud Accounts, Brute Force, Password Spraying
Screen Capture
Mavinject, System Binary Proxy Execution
Screen Capture
Odbcconf
PowerShell, Command and Scripting Interpreter, Disable or Modify Tools, Impair Defenses
Odbcconf
System Binary Proxy Execution
Remote System Discovery
Exploit Public-Facing Application, External Remote Services
Odbcconf
Disable or Modify Tools, Impair Defenses
Remote Desktop Protocol, Remote Services
Application Layer Protocol
Modify Registry
Disable or Modify Tools, Impair Defenses
Service Stop
Modify Registry
Modify Registry
Remote Access Software
Modify Registry
Steal or Forge Kerberos Tickets, Kerberoasting
Steal or Forge Kerberos Tickets, Kerberoasting
Modify Registry
Modify Registry
Modify Registry
Remote Desktop Protocol, Remote Services
Remote Desktop Protocol, Remote Services
Remote Desktop Protocol, Remote Services
IP Addresses, Gather Victim Network Information
Command and Scripting Interpreter
Msiexec
Disable or Modify Tools, Impair Defenses
Disable or Modify Tools, Impair Defenses
Disable or Modify Tools, Impair Defenses
Server Software Component, Exploit Public-Facing Application, External Remote Services
Exploit Public-Facing Application, External Remote Services
Exfiltration Over Alternative Protocol
Gather Victim Network Information, IP Addresses
Disable or Modify Tools, Impair Defenses
Command and Scripting Interpreter
Command and Scripting Interpreter
Command and Scripting Interpreter
Command and Scripting Interpreter
Digital Certificates
Plist File Modification
At, Scheduled Task/Job
Process Injection
At, Scheduled Task/Job
Digital Certificates
Digital Certificates
Protocol Impersonation
Network Sniffing
Digital Certificates
Valid Accounts
Command and Scripting Interpreter
Scheduled Task, Scheduled Task/Job
Exploit Public-Facing Application, External Remote Services
Exploit Public-Facing Application, External Remote Services
Cloud Accounts, Valid Accounts
Exploitation for Privilege Escalation
Local Accounts, Credentials In Files
Compromise Accounts, Cloud Accounts, Unsecured Credentials
Exploit Public-Facing Application, External Remote Services
Windows Service, Create or Modify System Process, Exploitation for Privilege Escalation
Steal or Forge Kerberos Tickets, AS-REP Roasting
Steal or Forge Kerberos Tickets, AS-REP Roasting
Domain Account, Account Discovery
Remote System Discovery
Windows Service
Remote System Discovery
Email Collection, Local Email Collection
Password Policy Discovery
Domain Trust Discovery
Password Policy Discovery
Permission Groups Discovery, Domain Groups
Remote System Discovery
Obfuscated Files or Information, Indicator Removal from Tools, PowerShell
Inhibit System Recovery
Remote System Discovery
Permission Groups Discovery, Domain Groups
File and Directory Discovery
Valid Accounts
Steal or Forge Kerberos Tickets
Steal or Forge Kerberos Tickets
Drive-by Compromise
Steal or Forge Kerberos Tickets
Steal or Forge Kerberos Tickets
Permission Groups Discovery, Local Groups
Domain Trust Discovery
Scheduled Task, Impair Defenses
System Binary Proxy Execution, Mshta
System Binary Proxy Execution, Masquerading, Rundll32, Rename System Utilities
System Services, Service Execution
System Binary Proxy Execution, Compiled HTML File
Exploit Public-Facing Application, External Remote Services
Exploit Public-Facing Application, External Remote Services
Indirect Command Execution
Web Shell, Server Software Component, Exploit Public-Facing Application, External Remote Services
Indirect Command Execution
Compromise Software Supply Chain, Supply Chain Compromise
System Network Connections Discovery
Remote System Discovery
Rootkit, Exploitation for Privilege Escalation
Remote System Discovery
Exploit Public-Facing Application
Remote System Discovery
Network Denial of Service
Remote Services, Distributed Component Object Model
Permission Groups Discovery, Domain Groups
Remote Services, Windows Remote Management
System Owner/User Discovery
Remote Services, Windows Remote Management
System Owner/User Discovery
Permission Groups Discovery, Local Groups
Steal or Forge Kerberos Tickets, AS-REP Roasting
Account Discovery, Local Account, PowerShell
Password Policy Discovery
File and Directory Permissions Modification
InstallUtil, System Binary Proxy Execution
InstallUtil, System Binary Proxy Execution
System Binary Proxy Execution, Regsvcs/Regasm
Steal or Forge Kerberos Tickets, Golden Ticket
System Binary Proxy Execution, Regsvcs/Regasm
Gather Victim Identity Information, Email Addresses
Use Alternate Authentication Material
Unix Shell, Command and Scripting Interpreter
Use Alternate Authentication Material
Cloud Account, Create Account
Cloud Account, Create Account
Command and Scripting Interpreter
Kerberoasting
OS Credential Dumping, PowerShell
Domain Trust Discovery, PowerShell
User Execution
Process Injection
Disable or Modify Tools, Impair Defenses
Steal or Forge Kerberos Tickets, AS-REP Roasting
Windows Management Instrumentation
System Binary Proxy Execution, Rundll32
System Binary Proxy Execution, Regsvcs/Regasm
Brute Force
System Binary Proxy Execution, Regsvcs/Regasm
Bypass User Account Control, Abuse Elevation Control Mechanism
Dynamic-link Library Injection, System Binary Proxy Execution, Process Injection
System Binary Proxy Execution
Exfiltration Over Unencrypted Non-C2 Protocol
Steal or Forge Kerberos Tickets, Kerberoasting
System Binary Proxy Execution, Rundll32
Process Injection
Use Alternate Authentication Material, Pass the Ticket
Scheduled Task, Scheduled Task/Job
Disable or Modify Cloud Firewall, Impair Defenses
Modify Authentication Process
Ingress Tool Transfer
Ingress Tool Transfer
Use Alternate Authentication Material, Pass the Ticket, Steal or Forge Kerberos Tickets, Kerberoasting, AS-REP Roasting
Use Alternate Authentication Material, Pass the Ticket
Exploitation for Privilege Escalation
Obfuscated Files or Information
Windows Command Shell
LSASS Memory, OS Credential Dumping
SSH Authorized Keys, Account Manipulation
SSH Authorized Keys, Account Manipulation
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
/etc/passwd and /etc/shadow, OS Credential Dumping
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Setuid and Setgid, Abuse Elevation Control Mechanism
Dynamic Linker Hijacking, Hijack Execution Flow
Kernel Modules and Extensions, Boot or Logon Autostart Execution
Kernel Modules and Extensions, Boot or Logon Autostart Execution
Kernel Modules and Extensions, Boot or Logon Autostart Execution
Valid Accounts, Domain Accounts
Linux and Mac File and Directory Permissions Modification, File and Directory Permissions Modification
Setuid and Setgid, Abuse Elevation Control Mechanism
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Setuid and Setgid, Abuse Elevation Control Mechanism
Local Account, Create Account
Sudo and Sudo Caching, Abuse Elevation Control Mechanism
Systemd Timers, Scheduled Task/Job
Systemd Timers, Scheduled Task/Job
Unix Shell Configuration Modification, Event Triggered Execution
RC Scripts, Boot or Logon Initialization Scripts
Valid Accounts, Domain Accounts
Unix Shell Configuration Modification, Event Triggered Execution
Valid Accounts, Domain Accounts
Cron, Scheduled Task/Job
Cron, Scheduled Task/Job
Cron, Scheduled Task/Job
Cron, Scheduled Task/Job
Cron, Scheduled Task/Job
Exploit Public-Facing Application, External Remote Services
Exploit Public-Facing Application, External Remote Services
Exploit Public-Facing Application
Exploit Public-Facing Application, External Remote Services
Exploit Public-Facing Application, Command and Scripting Interpreter
Ingress Tool Transfer
Ingress Tool Transfer
Ingress Tool Transfer, Exfiltration Over Web Service, System Binary Proxy Execution
Disable or Modify Tools
Unix Shell
Scheduled Task
Valid Accounts
Valid Accounts
Scheduled Task/Job, Scheduled Task
Automated Exfiltration
Create or Modify System Process, Windows Service
Remote Services, Distributed Component Object Model, MMC
Create or Modify System Process, Windows Service
Windows Management Instrumentation
Credentials from Web Browsers, Credentials from Password Stores
Create or Modify System Process, Windows Service
Remote Services, Windows Remote Management
Scheduled Task/Job, Scheduled Task
Gather Victim Host Information
Process Injection, Dynamic-link Library Injection
Disable or Modify Tools, Impair Defenses
Remote Services, Windows Remote Management
Transfer Data to Cloud Account
Data Encrypted for Impact
Remote Services, Distributed Component Object Model
Windows Management Instrumentation
Compile After Delivery, Obfuscated Files or Information
System Network Configuration Discovery, Internet Connection Discovery
Windows Management Instrumentation
InstallUtil, System Binary Proxy Execution
Disable or Modify System Firewall, Impair Defenses
Cloud Infrastructure Discovery
InstallUtil, System Binary Proxy Execution
Scheduled Task/Job, Scheduled Task
XSL Script Processing
Scheduled Task/Job, At
Remote Services, Windows Remote Management
Create or Modify System Process, Windows Service
Ingress Tool Transfer
Create or Modify System Process, Windows Service
Match Legitimate Name or Location, Masquerading, OS Credential Dumping, Active Scanning
Phishing
Phishing
Ingress Tool Transfer
Disable or Modify Tools, Impair Defenses
Kerberoasting
Clear Windows Event Logs, Indicator Removal
Data Destruction, File Deletion, Indicator Removal
Exfiltration Over Unencrypted Non-C2 Protocol, Exfiltration Over Alternative Protocol
Process Injection
Command and Scripting Interpreter, Component Object Model
Modify Registry
Regsvr32, Modify Registry
MSBuild, Trusted Developer Utilities Proxy Execution
Visual Basic, Command and Scripting Interpreter
Verclsid, System Binary Proxy Execution
Screen Capture
BITS Jobs
NTDS, OS Credential Dumping
NTDS, OS Credential Dumping
Disable or Modify System Firewall, Impair Defenses
System Binary Proxy Execution, Mshta
System Binary Proxy Execution, Mshta
System Binary Proxy Execution, Compiled HTML File
Automated Exfiltration
Install Root Certificate, Subvert Trust Controls
Account Discovery, Local Account
Account Discovery, Local Account
Archive via Utility, Archive Collected Data
NTDS, OS Credential Dumping
Remote Services, SMB/Windows Admin Shares
Archive via Utility, Archive Collected Data
System Binary Proxy Execution, Compiled HTML File
System Owner/User Discovery
Permission Groups Discovery, Local Groups
Permission Groups Discovery, Local Groups
Permission Groups Discovery, Local Groups
System Owner/User Discovery
System Owner/User Discovery
Command and Scripting Interpreter, JavaScript
System Owner/User Discovery
Command and Scripting Interpreter, JavaScript
XSL Script Processing
Command and Scripting Interpreter, JavaScript
System Network Connections Discovery
System Network Connections Discovery
System Network Connections Discovery
Security Account Manager, OS Credential Dumping
System Binary Proxy Execution, Rundll32
Local Account, Create Account
System Binary Proxy Execution, Rundll32
System Binary Proxy Execution, Control Panel
Remote System Discovery
Remote System Discovery
Domain Account, Account Discovery
System Information Discovery
Remote System Discovery
Remote System Discovery
Inhibit System Recovery
Malicious Image, User Execution
Inhibit System Recovery
Malicious Image, User Execution
Domain Trust Discovery
Compromise Client Software Binary
Trusted Relationship
Permission Groups Discovery, Domain Groups
Remote System Discovery
Compromise Software Dependencies and Development Tools, Supply Chain Compromise
Compromise Client Software Binary
Remote System Discovery
Compromise Software Dependencies and Development Tools, Supply Chain Compromise
OS Credential Dumping
Remote System Discovery
Forced Authentication
Remote System Discovery
Remote System Discovery
Password Policy Discovery
Password Policy Discovery
Phishing, Spearphishing Link
Password Policy Discovery
Password Policy Discovery
System Network Connections Discovery
Permission Groups Discovery, Domain Groups
Permission Groups Discovery, Domain Groups
Permission Groups Discovery, Domain Groups
Permission Groups Discovery, Domain Groups
Permission Groups Discovery, Domain Groups
Permission Groups Discovery, Domain Groups
Permission Groups Discovery, Domain Groups
Permission Groups Discovery, Domain Groups
Domain Account, Account Discovery
Domain Account, Account Discovery
Domain Trust Discovery
Cloud Service Discovery
Domain Account, Account Discovery
Domain Account, Account Discovery
Domain Account, Account Discovery
Exploitation for Credential Access
Spearphishing Attachment, Phishing
Account Discovery, Local Account
Spearphishing Attachment, Phishing
Trusted Relationship
Exploitation for Credential Access
Spearphishing Attachment, Phishing
Malicious Image, User Execution
Security Account Manager, OS Credential Dumping
Exfiltration Over Unencrypted Non-C2 Protocol, Exfiltration Over Alternative Protocol
Archive via Utility, Archive Collected Data
Exfiltration to Cloud Storage, Exfiltration Over Web Service
Spearphishing Attachment, Phishing
System Binary Proxy Execution, CMSTP
Indicator Removal
System Binary Proxy Execution, Rundll32
Msiexec, System Binary Proxy Execution
Process Injection
Data from Local System
User Execution, Malicious File
Archive via Utility, Archive Collected Data
Process Injection
System Binary Proxy Execution, Regsvr32
Command and Scripting Interpreter
Process Injection
System Binary Proxy Execution, Rundll32
System Binary Proxy Execution, Rundll32
System Binary Proxy Execution, Rundll32
Security Account Manager, OS Credential Dumping
System Binary Proxy Execution, Mshta
Data from Cloud Storage
Data from Cloud Storage
Cloud Account, Create Account
Cloud Accounts, Valid Accounts
Bypass User Account Control, Abuse Elevation Control Mechanism, MMC
Print Processors, Boot or Logon Autostart Execution
Print Processors, Boot or Logon Autostart Execution
Exploitation for Privilege Escalation
Print Processors, Boot or Logon Autostart Execution
Print Processors, Boot or Logon Autostart Execution
Print Processors, Boot or Logon Autostart Execution
Print Processors, Boot or Logon Autostart Execution
Disable or Modify Tools, Impair Defenses
System Services, Service Execution
Disable or Modify Cloud Firewall, Impair Defenses
Disable or Modify Cloud Firewall, Impair Defenses
Command and Scripting Interpreter, Visual Basic
Indicator Removal, Clear Windows Event Logs
Windows Management Instrumentation Event Subscription, Event Triggered Execution
File and Directory Permissions Modification
File Deletion, Indicator Removal
Inhibit System Recovery
Indicator Removal, Clear Windows Event Logs
Command and Scripting Interpreter
Inhibit System Recovery
Defacement
System Binary Proxy Execution, CMSTP
User Execution
User Execution
Domain Account, Local Groups, Domain Trust Discovery, Local Account, Account Discovery, Domain Groups, Permission Groups Discovery
Domain Account, Local Groups, Domain Trust Discovery, Local Account, Account Discovery, Domain Groups, Permission Groups Discovery
Domain Account, Local Groups, Domain Trust Discovery, Local Account, Account Discovery, Domain Groups, Permission Groups Discovery
Domain Account, Local Groups, Domain Trust Discovery, Local Account, Account Discovery, Domain Groups, Permission Groups Discovery
Exploit Public-Facing Application
Remote Desktop Protocol, Remote Services
System Binary Proxy Execution, CMSTP
Bypass User Account Control, Abuse Elevation Control Mechanism
Bypass User Account Control, Abuse Elevation Control Mechanism
File and Directory Permissions Modification
Account Discovery
Ingress Tool Transfer
Disable or Modify Tools, Impair Defenses
Account Access Removal
Service Stop
Service Stop
Disable or Modify Tools, Impair Defenses
Windows Service, Create or Modify System Process
Windows Service, Create or Modify System Process
Process Injection
Exfiltration Over Unencrypted Non-C2 Protocol, Exfiltration Over Alternative Protocol
Phishing, Spearphishing Attachment
Exfiltration Over Unencrypted Non-C2 Protocol, Exfiltration Over Alternative Protocol
Command and Scripting Interpreter
Obfuscated Files or Information
Scheduled Task/Job
Password Spraying, Brute Force
Exfiltration Over Alternative Protocol
Password Spraying, Brute Force
Password Spraying, Brute Force
Password Spraying, Brute Force
Password Spraying, Brute Force
Password Spraying, Brute Force
Password Spraying, Brute Force
Cloud Service Discovery
Phishing, Spearphishing Attachment
Phishing, Spearphishing Attachment
Security Account Manager, OS Credential Dumping
Security Account Manager, OS Credential Dumping
Password Spraying, Brute Force
System Services, Service Execution
Cloud Infrastructure Discovery, Brute Force
Account Manipulation
Account Manipulation
Cloud Groups, Account Manipulation, Permission Groups Discovery
Domain Trust Discovery
Disable or Modify Tools, Impair Defenses
BITS Jobs
Deobfuscate/Decode Files or Information
Create or Modify System Process
Data Encrypted for Impact
Inhibit System Recovery
Command and Scripting Interpreter, PowerShell
Cloud Accounts, Valid Accounts
Modify Registry, Bypass User Account Control, Abuse Elevation Control Mechanism
Scheduled Task, Scheduled Task/Job
Command and Scripting Interpreter, Windows Command Shell
Data Staged
Launch Agent, Create or Modify System Process
Ingress Tool Transfer
Launch Agent, Create or Modify System Process
System Binary Proxy Execution, Regsvcs/Regasm
System Binary Proxy Execution, Regsvcs/Regasm
System Binary Proxy Execution, Compiled HTML File
System Binary Proxy Execution, Rundll32
System Binary Proxy Execution, Rundll32
System Binary Proxy Execution, Rundll32
System Binary Proxy Execution, Rundll32
LSASS Memory
Exploitation for Privilege Escalation
NTDS, OS Credential Dumping
Exploitation for Privilege Escalation
Exploitation for Privilege Escalation
Valid Accounts
Valid Accounts
Inhibit System Recovery
System Binary Proxy Execution, Mshta
System Binary Proxy Execution, Mshta
PowerShell
Drive-by Compromise
Disable or Modify Cloud Firewall, Impair Defenses
Trusted Developer Utilities Proxy Execution, MSBuild
Trusted Developer Utilities Proxy Execution
System Binary Proxy Execution, Mshta
Data Encrypted for Impact
Disable or Modify Cloud Firewall, Impair Defenses
Web Shell, External Remote Services
Inhibit System Recovery
Email Forwarding Rule, Email Collection
Email Forwarding Rule, Email Collection
Password Guessing, Brute Force
Email Collection
Remote Email Collection, Email Collection
Exploitation for Client Execution
Windows Management Instrumentation Event Subscription, Event Triggered Execution
User Execution, Malicious File
Masquerading, Rename System Utilities
Application Shimming, Event Triggered Execution
Scheduled Task, Scheduled Task/Job
Services Registry Permissions Weakness, Hijack Execution Flow
Disable or Modify System Firewall
Application Shimming, Event Triggered Execution
Rename System Utilities
Bypass User Account Control, Abuse Elevation Control Mechanism
Masquerading, Rename System Utilities
Command and Scripting Interpreter, Windows Command Shell
System Network Configuration Discovery
Inhibit System Recovery
Data Destruction
Windows Command Shell
Service Stop
Data Encrypted for Impact
TFTP Boot, Pre-OS Boot
Hardware Additions, Network Denial of Service, Adversary-in-the-Middle, ARP Cache Poisoning
Hardware Additions, Automated Exfiltration, Network Denial of Service, Traffic Duplication
Hardware Additions, Network Denial of Service, Adversary-in-the-Middle, ARP Cache Poisoning
Exfiltration Over C2 Channel
Use Alternate Authentication Material, Pass the Hash
Valid Accounts
Valid Accounts
Valid Accounts
Valid Accounts
Valid Accounts
Exploitation of Remote Services
Indicator Removal, Network Share Connection Removal
Exploit Public-Facing Application
Cloud Accounts, Valid Accounts
Cloud Accounts, Valid Accounts
Valid Accounts
Unused/Unsupported Cloud Regions
Valid Accounts
Cloud Accounts, Valid Accounts
Cloud Accounts, Valid Accounts
Valid Accounts
Hardware Additions, Network Denial of Service, Adversary-in-the-Middle, ARP Cache Poisoning
Hardware Additions, Network Denial of Service, Adversary-in-the-Middle
Data from Cloud Storage
Data from Cloud Storage
Exploit Public-Facing Application
Cloud Accounts, Valid Accounts
Exploitation for Client Execution
Exploitation for Client Execution
Valid Accounts
Valid Accounts
Use Alternate Authentication Material
Valid Accounts
Valid Accounts
SMB/Windows Admin Shares, Remote Services
Masquerading
Masquerading
Modify Registry
SMB/Windows Admin Shares, Remote Services
Phishing
Malicious File
Change Default File Association
Remote Desktop Protocol, Remote Services
Windows Service, Create or Modify System Process
Cloud Accounts
Exfiltration Over Alternative Protocol
Command and Scripting Interpreter, Windows Command Shell
Cloud Accounts
Cloud Accounts
Cloud Accounts
Remote Desktop Protocol, Remote Services
PowerShell, Windows Command Shell
Command and Scripting Interpreter, PowerShell
Email Collection, Local Email Collection
Cloud Accounts
System Services, Service Execution
Email Collection, Remote Email Collection
Remote Email Collection, Email Collection
Valid Accounts, Default Accounts
Exfiltration Over Unencrypted Non-C2 Protocol
File and Directory Permissions Modification, Windows File and Directory Permissions Modification
Cloud Accounts
Exfiltration Over Unencrypted Non-C2 Protocol, Exfiltration Over Alternative Protocol
Software Deployment Tools
Cloud Accounts
Spearphishing via Service
Cloud Accounts
Cloud Accounts
File Transfer Protocols, Application Layer Protocol
Web Protocols
Scheduled Task
Exfiltration Over Unencrypted Non-C2 Protocol
Cloud Service Discovery
Local Account, Create Account
Remote Desktop Protocol, Remote Services
Local Account, Create Account
Indicator Removal, Clear Windows Event Logs
Path Interception by Unquoted Path, Hijack Execution Flow
Exploitation for Privilege Escalation
Cloud Service Discovery
Cloud Service Discovery
Cloud Service Discovery
Cloud Service Discovery
Windows Management Instrumentation
Windows Management Instrumentation
LSASS Memory, OS Credential Dumping
DNS, Application Layer Protocol
NTDS, OS Credential Dumping
LSASS Memory, OS Credential Dumping
LSASS Memory, OS Credential Dumping
LSASS Memory
LSASS Memory, OS Credential Dumping
LSASS Memory, OS Credential Dumping
System Information Discovery
LSASS Memory
Hidden Files and Directories
Data Encrypted for Impact
Indicator Removal
Data from Cloud Storage
Windows Management Instrumentation
Windows Management Instrumentation
Create Account
Valid Accounts
Data from Cloud Storage
Non-Application Layer Protocol
Disable or Modify Cloud Firewall
Cloud Accounts
Cloud Accounts
Unused/Unsupported Cloud Regions
Unused/Unsupported Cloud Regions
Unused/Unsupported Cloud Regions
Unused/Unsupported Cloud Regions
System Information Discovery, External Remote Services
Network Denial of Service, Reflection Amplification
Domain Accounts