Common Information
Type Value
Value
Windows Command Shell - T1059.003
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may abuse the Windows command shell for execution. The Windows command shell ([cmd](https://attack.mitre.org/software/S0106)) is the primary command prompt on Windows systems. The Windows command prompt can be used to control almost any aspect of a system, with various permission levels required for different subsets of commands. The command prompt can be invoked remotely via [Remote Services](https://attack.mitre.org/techniques/T1021) such as [SSH](https://attack.mitre.org/techniques/T1021/004).(Citation: SSH in Windows) Batch files (ex: .bat or .cmd) also provide the shell with a list of sequential commands to run, as well as normal scripting operations such as conditionals and loops. Common uses of batch files include long or repetitive tasks, or the need to run the same set of commands on multiple systems. Adversaries may leverage [cmd](https://attack.mitre.org/software/S0106) to execute various commands and payloads. Common uses include [cmd](https://attack.mitre.org/software/S0106) to execute a single command, or abusing [cmd](https://attack.mitre.org/software/S0106) interactively with input and output forwarded over a command and control channel.
Details Published Attributes CTI Title
Details Website 2022-09-30 98 A glimpse into the shadowy realm of a Chinese APT: detailed analysis of a ShadowPad intrusion
Details Website 2022-09-29 73 Malware Persistence Within ESXi Hypervisors | Malicious VIBs
Details Website 2022-09-22 24 Hunting attackers using Microsoft Protection Logs (MPLogs)!
Details Website 2022-09-14 53 DPRK Job Opportunity Phishing via WhatsApp | PuTTY Utility
Details Website 2022-09-12 74 Chiseling In: Lorenz Ransomware Group Cracks MiVoice And Calls Back For Free - Arctic Wolf
Details Website 2022-09-09 17 BUGHATCH Malware Analysis — Elastic Security Labs
Details Website 2022-09-08 85 CUBA Ransomware Campaign Analysis — Elastic Security Labs
Details Website 2022-08-31 156 Ryuk Ransomware: History, Timeline, and Adversary Simulation - FourCore
Details Website 2022-08-18 181 APT41 World Tour 2021 on a tight schedule
Details Website 2022-08-17 100 UNC3890 | Suspected Iranian Threat Actor Targets Israel
Details Website 2022-08-17 100 Suspected Iranian Actor Targeting Israeli Shipping, Healthcare, Government and Energy Sectors | Mandiant
Details Website 2022-08-08 143 BumbleBee Roasts Its Way to Domain Admin
Details Website 2022-08-02 34 Raspberry Robin gets the worm early
Details Website 2022-07-26 65 New Wave of Emotet - When Project X Turns Into Y - Cynet
Details Website 2022-07-20 4 APT41: A Case Sudy
Details Website 2022-07-20 120 Securonix Threat Labs Initial Coverage Advisory: STIFF#BIZON Detection Using Securonix – New Attack Campaign Observed Possibly Linked to Konni/APT37 (North Korea)
Details Website 2022-07-18 28 MAR-10382580-r2.v1 – RAT | CISA
Details Website 2022-06-10 76 Threat Attribution — Chimera “Under the Radar”
Details Website 2022-06-10 39 Taiwan Government Targeted by Multiple Cyberattacks in April 2020
Details Website 2022-06-02 99 To HADES and Back: UNC2165 Shifts to LOCKBIT to Evade Sanctions | Mandiant
Details Website 2022-06-01 50 Analyzing AsyncRAT distributed in Colombia | Welcome to Jstnk webpage
Details Website 2022-05-27 50 Emotet Analysis: New LNKs in the Infection Chain | Kroll
Details Website 2022-05-17 679 Space Pirates: analyzing the tools and connections of a new hacker group
Details Website 2022-05-17 21 Ransomware Spotlight: RansomEXX - Security News
Details Website 2022-05-02 39 UNC3524: Eye Spy on Your Email | Mandiant