Common Information
Type | Value |
---|---|
Value |
User Execution - T1204 |
Category | Attack-Pattern |
Type | Mitre-Enterprise-Attack-Attack-Pattern |
Misp Type | Cluster |
Description | An adversary may rely upon specific actions by a user in order to gain execution. This may be direct code execution, such as when a user opens a malicious executable delivered via Spearphishing Attachment with the icon and apparent extension of a document file. It also may lead to other execution techniques, such as when a user clicks on a link delivered via Spearphishing Link that leads to exploitation of a browser or application vulnerability via Exploitation for Client Execution. While User Execution frequently occurs shortly after Initial Access it may occur at other phases of an intrusion, such as when an adversary places a file in a shared directory or on a user's desktop hoping that a user will click on it. Detection: Monitor the execution of and command-line arguments for applications that may be used by an adversary to gain Initial Access that require user interaction. This includes compression applications, such as those for zip files, that can be used to Deobfuscate/Decode Files or Information in payloads. Anti-virus can potentially detect malicious documents and files that are downloaded and execuited on the user's computer. Endpoint sensing or network sensing can potentially detect malicious events once the file is opened (such as a Microsoft Word document or PDF reaching out to the internet or spawning Powershell.exe) for techniques such as Exploitation for Client Execution and Scripting. Platforms: Linux, Windows, macOS Data Sources: Anti-virus, Process command-line parameters, Process monitoring Permissions Required: User |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2023-03-14 | 3 | Don’t Take the Bait: How to Spot and Avoid Phishing Attacks | ||
Details | Website | 2023-03-14 | 36 | Anomali Cyber Watch: Xenomorph Automates The Whole Fraud Chain on Android, IceFire Ransomware Started Targeting Linux, Mythic Leopard Delivers Spyware Using Romance Scam | ||
Details | Website | 2023-03-09 | 38 | DUCKTAIL: Threat Operation Re-emerges with New LNK, PowerShell, and Other Custom Tactics to Avoid Detection | Deep Instinct | ||
Details | Website | 2023-03-09 | 16 | BlackSnake Ransomware Emerges from Chaos Ransomware's Shadow | ||
Details | Website | 2023-03-06 | 4 | MQsTTang Backdoor Detection: New Custom Malware by Mustang Panda APT Actively Used in the Latest Campaign Against Government Entities - SOC Prime | ||
Details | Website | 2023-03-06 | 671 | Vulnerability Summary for the Week of February 27, 2023 | CISA | ||
Details | Website | 2023-03-02 | 199 | Russia/Ukraine Update - February 2023 | ||
Details | Website | 2023-03-01 | 16 | MITRE ATT&CK and D3FEND for Cloud and Containers – Sysdig | ||
Details | Website | 2023-03-01 | 70 | Multi-Year Spearphishing Campaign Targets the Maritime Industry Likely for Financial Gain | ||
Details | Website | 2023-02-28 | 44 | CISA Red Team Shares Key Findings to Improve Monitoring and Hardening of Networks | CISA | ||
Details | Website | 2023-02-28 | 0 | Hackers Attack Employees from Six Law Firms with the GootLoader and… | ||
Details | Website | 2023-02-28 | 16 | Aligning Falco’s Cloudtrail Rules with MITRE ATT&CK – Sysdig | ||
Details | Website | 2023-02-28 | 56 | Anomali Cyber Watch: Newly-Discovered WinorDLL64 Backdoor Has Code Similarities with Lazarus GhostSecret, Atharvan Backdoor Can Be Restricted to Communicate on Certain Days | ||
Details | Website | 2023-02-27 | 76 | Lumma Stealer targets YouTubers via Spear-phishing Email | ||
Details | Website | 2023-02-24 | 41 | New WhiteSnake Stealer Offered for Sale Via MaaS Model | ||
Details | Website | 2023-02-23 | 27 | Mustang Panda APT Group Uses European Commission-Themed Lure to Deliver PlugX Malware | ||
Details | Website | 2023-02-20 | 31 | Decoding the Inner Workings of DarkCloud Stealer | ||
Details | Website | 2023-02-17 | 4 | ProxyShellMiner Detection: Novel Crypto-Mining Attacks Abusing CVE-2021-34473 and CVE-2021-34523 ProxyShell Vulnerabilities in Windows Exchange Servers - SOC Prime | ||
Details | Website | 2023-02-17 | 49 | The Many Faces of Qakbot Malware: A Look at Its Diverse Distribution Methods | ||
Details | Website | 2023-02-15 | 8 | Uncovering The Dark Side of DarkBit Ransomware | ||
Details | Website | 2023-02-08 | 21 | Earth Zhulong Familiar Patterns Target Southeast Asian Firms | ||
Details | Website | 2023-02-06 | 19 | Massive Ransomware Attack Targets VMware ESXi Servers | ||
Details | Website | 2023-02-02 | 37 | New BATLoader Disseminates RATs and Stealers | ||
Details | Website | 2023-02-01 | 23 | Qakbot's Evolution Continues with New Strategies | ||
Details | Website | 2023-02-01 | 37 | Vector Stealer: A Gateway for RDP Hijacking |