Common Information
Type | Value |
---|---|
Value |
MMC - T1218.014 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may abuse mmc.exe to proxy execution of malicious .msc files. Microsoft Management Console (MMC) is a binary that may be signed by Microsoft and is used in several ways in either its GUI or in a command prompt.(Citation: win_mmc)(Citation: what_is_mmc) MMC can be used to create, open, and save custom consoles that contain administrative tools created by Microsoft, called snap-ins. These snap-ins may be used to manage Windows systems locally or remotely. MMC can also be used to open Microsoft created .msc files to manage system configuration.(Citation: win_msc_files_overview) For example, <code>mmc C:\Users\foo\admintools.msc /a</code> will open a custom, saved console msc file in author mode.(Citation: win_mmc) Another common example is <code>mmc gpedit.msc</code>, which will open the Group Policy Editor application window. Adversaries may use MMC commands to perform malicious tasks. For example, <code>mmc wbadmin.msc delete catalog -quiet</code> deletes the backup catalog on the system (i.e. [Inhibit System Recovery](https://attack.mitre.org/techniques/T1490)) without prompts to the user (Note: <code>wbadmin.msc</code> may only be present by default on Windows Server operating systems).(Citation: win_wbadmin_delete_catalog)(Citation: phobos_virustotal) Adversaries may also abuse MMC to execute malicious .msc files. For example, adversaries may first create a malicious registry Class Identifier (CLSID) subkey, which uniquely identifies a [Component Object Model](https://attack.mitre.org/techniques/T1559/001) class object.(Citation: win_clsid_key) Then, adversaries may create custom consoles with the “Link to Web Address” snap-in that is linked to the malicious CLSID subkey.(Citation: mmc_vulns) Once the .msc file is saved, adversaries may invoke the malicious CLSID payload with the following command: <code>mmc.exe -Embedding C:\path\to\test.msc</code>.(Citation: abusing_com_reg) |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2025-04-21 | 7 | 多阶段恶意攻击利用.JSE 和 PowerShell 部署 Agent Tesla 与 XLoader 恶意软件-安全KER - 安全资讯平台 | ||
Details | Website | 2025-04-19 | 5 | Stealthy Malware Attacks Leveraging .JSE and PowerShell: A Multi-Stage Threat Unfolds | ||
Details | Website | 2025-04-18 | 12 | 黑客利用 MMC 脚本发动攻击,部署 MysterySnail RAT 威胁系统安全-安全KER - 安全资讯平台 | ||
Details | Website | 2025-04-18 | 2 | Chinese hackers target Russian govt with upgraded RAT malware | ||
Details | Website | 2025-04-17 | 20 | Новая версия MysterySnail RAT и облегченный бэкдор MysteryMonoSnail | ||
Details | Website | 2025-04-17 | 20 | IronHusky updates the forgotten MysterySnail RAT to target Russia and Mongolia | ||
Details | Website | 2025-04-17 | 21 | New version of MysterySnail RAT and lightweight MysteryMonoSnail backdoor | ||
Details | Website | 2025-04-10 | 13 | 關於分分鐘拿下整個網域,你還疏忽了什麼? | DEVCORE 戴夫寇爾 | ||
Details | Website | 2025-04-08 | 8 | 2.6万暗网论坛帖子揭示网络攻击日益复杂,OTP 机器人成为黑客新宠;HellCat利用被窃Jira凭证攻击四家企业 | 牛览 - 安全牛 | ||
Details | Website | 2025-04-07 | 1639 | US-CERT Vulnerability Summary for the Week of March 31, 2025 - RedPacket Security | ||
Details | Website | 2025-04-04 | 0 | This Week’s Threat Landscape-Critical Vulnerabilities, Zero-Days, and Botnets | ||
Details | Website | 2025-04-01 | 9 | 31st March – Threat Intelligence Report | ||
Details | Website | 2025-04-01 | 9 | 31st March – Threat Intelligence Report - Check Point Research | ||
Details | Website | 2025-03-31 | 0 | The PIN is Mightier Than the Face | ||
Details | Website | 2025-03-31 | 5 | My First Malware Analysis: A Dive into Adylkuzz | ||
Details | Website | 2025-03-28 | 11 | Cybersecurity News Review — Week 13 (2025) | ||
Details | Website | 2025-03-28 | 25 | Cyber Chaos Unfolds: Zero-Days, Botnets & Espionage Surge This Week | ||
Details | Website | 2025-03-28 | 2 | The Good, the Bad and the Ugly in Cybersecurity - Week 13 | ||
Details | Website | 2025-03-27 | 2 | 警惕!EncryptHub 利用 Windows Zero-Day 漏洞部署 Rhadamanthys 与 StealC 恶意软件-安全KER - 安全资讯平台 | ||
Details | Website | 2025-03-26 | 2 | EncryptHub linked to MMC zero-day attacks on Windows systems - PRSOL:CC | ||
Details | Website | 2025-03-26 | 0 | Windows-targeted EncryptHub attacks involve MMC zero-day exploitation | ||
Details | Website | 2025-03-26 | 3 | Windows MMC Framework Zero-Day Exploited to Execute Malicious Code | ||
Details | Website | 2025-03-26 | 64 | CVE-2025-26633: Water Gamayun использует MUIPath с помощью MSC EvilTwin - SEC-1275-1 | ||
Details | Website | 2025-03-26 | 0 | Russian Ransomware Gang Exploited Windows Zero-Day Before Patch | Antivirus and Security news | ||
Details | Website | 2025-03-25 | 12 | CVE-2025-26633: How Water Gamayun Weaponizes MUIPath using MSC EvilTwin |