Common Information
Type | Value |
---|---|
Value |
Malicious File - T1204.002 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | An adversary may rely upon a user opening a malicious file in order to gain execution. Users may be subjected to social engineering to get them to open a file that will lead to code execution. This user action will typically be observed as follow-on behavior from [Spearphishing Attachment](https://attack.mitre.org/techniques/T1566/001). Adversaries may use several types of files that require a user to execute them, including .doc, .pdf, .xls, .rtf, .scr, .exe, .lnk, .pif, and .cpl. Adversaries may employ various forms of [Masquerading](https://attack.mitre.org/techniques/T1036) and [Obfuscated Files or Information](https://attack.mitre.org/techniques/T1027) to increase the likelihood that a user will open and successfully execute a malicious file. These methods may include using a familiar naming convention and/or password protecting the file and supplying instructions to a user on how to open it.(Citation: Password Protected Word Docs) While [Malicious File](https://attack.mitre.org/techniques/T1204/002) frequently occurs shortly after Initial Access it may occur at other phases of an intrusion, such as when an adversary places a file in a shared directory or on a user's desktop hoping that a user will click on it. This activity may also be seen shortly after [Internal Spearphishing](https://attack.mitre.org/techniques/T1534). |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-12-19 | 17 | Silent Push uncovers a large Russian Ursnif/Gozi banking trojan operation targeting global AnyDesk users. — Silent Push Threat Intelligence | ||
Details | Website | 2024-12-03 | 48 | Privacy tools (not) for you — Silent Push Threat Intelligence | ||
Details | Website | 2024-11-17 | 0 | From Detection to Response: The Power of XDR in Cybersecurity | ||
Details | Website | 2024-11-17 | 2 | Malware and Cache | ||
Details | Website | 2024-11-17 | 6 | Automating Security with Wazuh Active Response | ||
Details | Website | 2024-11-16 | 27 | KQL KC7 — AzureCrest : Section 4 & 5 | ||
Details | Website | 2024-11-16 | 6 | Iranian Hackers Deploy WezRat Malware in Attacks Targeting Israeli Organizations - CyberSRC | ||
Details | Website | 2024-11-15 | 3 | Hack The Box | Sherlock | Unit42 | ||
Details | Website | 2024-11-15 | 8 | Proving Grounds Practice — Flimsy | ||
Details | Website | 2024-11-15 | 7 | Easy $20,160 bug from hackerone | ||
Details | Website | 2024-11-14 | 4 | Simple Include Statement Hides Casino Spam | ||
Details | Website | 2024-11-14 | 0 | The CrowdStrike Incident: The Devil is in the Details, and Chaos is in the Code - Cybersecurity Insiders | ||
Details | Website | 2024-11-14 | 4 | Update now! November Patch Tuesday tackles 4 zero-days, two actively exploited - ThreatDown by Malwarebytes | ||
Details | Website | 2024-11-14 | 3 | Windows 0-Day Exploited in Wild with Single Right Click | ||
Details | Website | 2024-11-14 | 5 | CVE-2024-43451 allows stealing NTLMv2 hash | ||
Details | Website | 2024-11-14 | 3 | ZDI-24-1511 | ||
Details | Website | 2024-11-13 | 4 | WriteUp > LetsDefend : Infection with Cobalt Strike | ||
Details | Website | 2024-11-13 | 7 | Microsoft Patch Tuesday: November 2024 - Arctic Wolf | ||
Details | Website | 2024-11-13 | 7 | Microsoft Patch Tuesday: November 2024 | Arctic Wolf | ||
Details | Website | 2024-11-13 | 16 | Microsoft’s November 2024 Patch Tuesday: 89 Vulnerabilities Addressed, Two Active Zero-Day Exploits - SOCRadar® Cyber Intelligence Inc. | ||
Details | Website | 2024-11-13 | 17 | Microsoft’s November 2024 Patch Tuesday: 89 Vulnerabilities Addressed, Two Active Zero-Day Exploits | ||
Details | Website | 2024-11-13 | 0 | Cyber Threat Intelligence: Data Ingestion and Synergy With Other Units | ||
Details | Website | 2024-11-13 | 55 | HawkEye Malware: Technical Analysis | ||
Details | Website | 2024-11-13 | 55 | HawkEye Malware: Technical Analysis - ANY.RUN's Cybersecurity Blog | ||
Details | Website | 2024-11-13 | 2 | Black Alps 2024: Highlights from Switzerland Cybersecurity Ecosystem |