You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

9.2 KiB

1processCategoryProcess_Details
2arp.exeTarget DiscoveryObtains information about hosts on the local broadcast domain
3at.exeCommand ExecutionExecutes a task at the specified time and it may be used to secretly place an application or script without being recognized by the user in advance and then execute it at the desired time.
4bcdedit.exePrivilege EscalationTool for editing the boot configuration and it may be used to escalate privileges
5bcp.exeData extractionBulk copy of data from database. It may be used to exfiltrate data.
6chcp.exeMalwareDisplays the number of the active console code page, or changes the console's active console code page.
7cmd.exeCommand ExecutionCan be used to execute a large number of commands
8cscript.exeCommand ExecutionCan be used to execute a large number of scripts
9csvde.exeAcquisition of Account InformationOutputs account information on the Active Directory in the CSV format and it can be used to extract information on an existing account and select users and clients available as attack targets.
10dsquery.exeAcquisition of Account InformationObtains information, such as users and groups, from a directory service and it can be used to extract information on an existing account and select users and clients available as attack targets.
11Find-GPOPasswords.ps1Password Hash AcquisitionAcquires any password descriptions in a group policy file and may attempt to infiltrate other hosts using acquired passwords (by executing the tool on Active Directory).
12GSECDUMP.EXEPassword Hash AcquisitionExtracts hash from SAM/AD or logon sessions and use it to log on to other hosts using acquired hash information.
13icacls.exeFile SharingChanges the file access rights and it can be used to change the rights to read a file that cannot be read by the used account. It is also used to capture rights so that the content of a file created by the attacker will not be viewable
14ipconfig.exeTarget DiscoveryDisplays or changes IP stack information
15ldifde.exeAcquisition of Account InformationOutputs account information on the Active Directory in the LDIF format and it can be used to extract information on an existing account and select users and clients available as attack targets.
16mailpv.exePassword Hash AcquisitionExtracts account information saved in the mail client settings on the machine
17mimikatz.exePassword Hash AcquisitionSteals recorded authentication information and it can be used to escalate the privileges to the domain Administrator privileges.
18ms14-068.exeEscalation to SYSTEM PrivilegesChanges the privileges of the domain user to those of another user
19nbtstat.exeTarget DiscoveryAllows a refresh of the NetBIOS name cache and the names registered with Windows Internet Name Service (WINS).
20nc.exeTarget DiscoveryMultpurpose tool, can be used for probing ports
21net.exeAdding or Deleting a Local User/GroupAdds a user account in a client or the domain or creates a network share and it can be used to create accounts or additional sessions in the machine the attacker has infected or to communicate with other hosts.
22net1.exeAdding or Deleting a Local User/GroupAdds a user account in a client or the domain or creates a network share and it can be used to create accounts or additional sessions in the machine the attacker has infected or to communicate with other hosts.
23netcat.exeTarget DiscoveryMultpurpose tool, can be used for probing ports
24netshCommand ExecutionAllows to, either locally or remotely, display or modify the network configuration of a computer that is currently running.
25netstat.exeTarget DiscoveryDisplays active TCP connections, ports on which the computer is listening, Ethernet statistics, the IP routing table, IPv4 statistics
26nmapTarget DiscoveryPort scanner
27nslookup.exeTarget DiscoveryPerforms a DNS lookup
28ntdsutil.exeCapturing Active Directory DatabaseA command to maintain Active Directory databases and it can be used to extract NTDS.DIT, a database for NTDS, and other tools are used to analyze passwords (executed in Active Directory).
29OSQL.exeData extractionAllows execution of Transact-SQL statements, system procedures, and script files. Can be used to attack a database or exfiltrate information.
30powercat.ps1MalwarePart of PSAttack hacking tools
31powershell.exeCommand ExecutionAllows remote command execution and it may be used to change settings to enable the Domain Controller and other hosts on the network to perform operations requiring administrator rights
32procdump.exeCommand ExecutionUtility whose primary purpose is monitoring an application for CPU spikes and generating crash dumps during a spike that an administrator or developer can use to determine the cause of the spike
33psexec.exeCommand ExecutionExecutes a process on a remote system and it may be used to remotely execute a command on client and servers in a domain.
34psexecsvc.exeCommand ExecutionTool used for remotely executing processes on other systems
35psLoggedOn.exeTarget DiscoveryDisplays both the locally logged on users and users logged on via resources for either the local computer
36PwDump7.exePassword Hash AcquisitionDisplays a list of password hashes in the system and it may be used to perform logon authentication on other hosts using the acquired hash information.
37PWDumpX.exePassword Hash AcquisitionAcquires a password hash from a remote host and use it to perform attacks such as pass-the-hash.
38qprocess.exePrivilege EscalationQuery Process Utility - It can be used to start an elevated subprocess
39QuarksPwDump.exePassword Hash AcquisitionAcquires the NTLM hash of a local domain account and cached domain password and it may be used to perform logon authentication on other hosts using the acquired hash information.
40query.exeTarget DiscoveryQuery User Sessions in Windows
41rar.exeCommand ExecutionUsed by many attackers to deploy tools, exfiltrate information
42rdpv.exePassword Hash AcquisitionExtracts account information saved in the RDP settings on the machine and use it to log in to other hosts with such passwords.
43reg.exeCommand ExecutionAdds, changes, and displays registry subkey information and values in registry entries.
44route.exeTarget DiscoveryDisplay or changes routing information
45runas.exeCommand ExecutionRuns command using a different account
46rundll32Command ExecutionTool responsible for running DLLs and placing its libraries in the memory
47sc.exeCommand ExecutionRetrieves and sets control information about services.
48schtasks.exeCommand ExecutionEnables an administrator to create, delete, query, change, run, and end scheduled tasks on a local or remote computer. Can be used by an attacker in many situations.
49sdbinst.exePrivilege EscalationSDB UAC Bypass - used to execute an application that is not normally executed by pretending to execute a typical application.
50sdelete.exeDeleting EvidenceDeletes a file after overwriting it several times and it can be used to delete a file created in the course of an attack to make it impossible to be recovered.
51sethc.exePrivilege EscalationSticky Keys utility
52sqlcmd.exeCommand ExecutionManage SQL server from command line
53ssh.exeCommand ExecutionOpens a secure shell on a remote host
54sysprep.exePrivilege EscalationPrepares an installation of Windows for duplication, auditing, and customer delivery.
55systeminfo.exeTarget DiscoveryCommand-line utility that displays information about your Windows version, BIOS, processor, memory, network configuration
56tasklist.exeTarget DiscoveryDisplays running processes
57timestomp.exeDeleting EvidenceChanges the file timestamp and it can be used to conceal the access to the file by restoring the timestamp.
58tracert.exeTarget DiscoveryTraceroute tool. It can be used to discover information about the network
59vssadmin.exeCapturing Active Directory DatabaseCreates Volume Shadow Copy and extracts NTDS.DIT and it can be used to extract NTDS.DIT, a database for NTDS, so that the password can be analysed using other tools.
60wce.exePassword Hash AcquisitionAcquires password hash information in the memory of a logged in host
61wceaux.dllPrivilege EscalationExecutes a command with higher privileges using the hash of the acquired password
62WebBrowserPassView.exePassword Hash AcquisitionExtracts user names and passwords saved in the web browser of a machine
63wevtutil.exeDeleting EvidenceDeletes Windows event logs and it can be used to delete the evidence of an attack.
64whoami.exeTarget DiscoveryDisplays information about the current user
65winrar.exeCommand ExecutionUsed by many attackers to deploy tools, exfiltrate information
66winrs.exeCommand ExecutionExecutes a command on a remote hosts
67WMIC.exeCommand ExecutionA tool used for Windows system management and it may be used to acquire information on the remote system or to execute a command with WMI.
68wmic.exeCommand ExecutionWindows Management Instrumentation Command-line
69wmiexec.vbsCommand ExecutionA tool used for Windows system management that may execute a script for other hosts.
70wscript.exeCommand ExecutionCan be used to execute a large number of scripts
71wsmprovhost.exePrivilege EscalationWinRM Remote Powershell - Can be used to elevate privileges
72wusa.exePrivilege EscalationWindows Update Standalone Installer - Can be used to elevate privileges