Common Information
Type Value
Value
Rename System Utilities - T1036.003
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may rename legitimate system utilities to try to evade security mechanisms concerning the usage of those utilities. Security monitoring and control mechanisms may be in place for system utilities adversaries are capable of abusing. (Citation: LOLBAS Main Site) It may be possible to bypass those security mechanisms by renaming the utility prior to utilization (ex: rename <code>rundll32.exe</code>). (Citation: Elastic Masquerade Ball) An alternative case occurs when a legitimate utility is copied or moved to a different directory and renamed to avoid detections based on system utilities executing from non-standard paths. (Citation: F-Secure CozyDuke)
Details Published Attributes CTI Title
Details Website 2024-11-16 90 From Royal to BlackSuit: Understanding the Tactics and Impact of a Sophisticated Ransomware Strain | #ransomware | #cybercrime | National Cyber Security Consulting
Details Website 2024-10-28 21 Malware Trends Report: Q3, 2024
Details Website 2024-10-22 21 Malware Trends Report: Q3, 2024
Details Website 2024-10-22 21 Malware Trends Report: Q3, 2024 - ANY.RUN's Cybersecurity Blog
Details Website 2024-09-12 13 Emulating the Persistent and Stealthy Ebury Linux Malware
Details Website 2024-07-29 20 Attackers (Crowd)Strike with Infostealer Malware - Perception Point
Details Website 2023-09-15 816 UNC3944: SMS Phishing, SIM Swapping, and Ransomware Attacks
Details Website 2023-05-22 141 IcedID Macro Ends in Nokoyawa Ransomware - The DFIR Report
Details Website 2023-05-10 4 SafeBreach Coverage for US-CERT Alert (AA23-129A) – Snake Malware
Details Website 2023-04-27 18 SIEM Korelasyon Kuralları, Çapraz Korelasyonlar ve İleri Korelasyon
Details Website 2023-03-28 7 Hacker’s Playbook Threat Coverage Roundup: March 28, 2023
Details Website 2023-03-21 16 SIEM Gerçekten Öldü mü?
Details Website 2023-02-27 49 Kaseya ransomware attack: a cyber kill chain analysis
Details Website 2022-11-18 22 Securonix Threat Labs Security Advisory: Qbot/QakBot Malware’s New Initial Execution Uses Grifted Regsvr32 Binary to Run DLL Payload
Details Website 2022-09-30 98 A glimpse into the shadowy realm of a Chinese APT: detailed analysis of a ShadowPad intrusion
Details Website 2022-06-10 76 Threat Attribution — Chimera “Under the Radar”
Details Website 2022-02-08 36 LolZarus: Lazarus Group Incorporating Lolbins into Campaigns | Qualys Security Blog
Details Website 2021-04-22 33 CISA Identifies SUPERNOVA Malware During Incident Response | CISA
Details Website 2021-02-25 161 Lazarus targets defense industry with ThreatNeedle
Details Website 2021-02-04 25 Connecting the dots inside the Italian APT Landscape - Yoroi
Details Website 2021-01-12 216 Abusing cloud services to fly under the radar
Details Website 2021-01-12 215 Abusing cloud services to fly under the radar
Details Website 2020-12-21 28 How A Device to Cloud Architecture Defends Against the SolarWinds Supply Chain Compromise | McAfee Blog