DS0017 Command
A directive given to a computer program, acting as an interpreter of some kind, in order to perform a specific task12
Item | Value |
---|---|
ID | DS0017 |
Platforms | Android, Containers, Linux, Network, Windows, iOS, macOS |
Collection Layers | Container, Host |
Version | 1.1 |
Created | 20 October 2021 |
Last Modified | 20 April 2023 |
Data Components
Command Execution
The execution of a line of text, potentially with arguments, created from program code (e.g. a cmdlet executed via powershell.exe, interactive commands like >dir, shell executions, etc. )
References
-
Confluence Support. (2021, September 8). How to enable command line audit logging in linux. Retrieved September 23, 2021. ↩
-
Gagliardi, R. (n.d.). Audit in a OS X System. Retrieved September 23, 2021. ↩
-
Microsoft. (n.d.). Background Intelligent Transfer Service. Retrieved January 12, 2018. ↩
-
French, D., Murphy, B. (2020, March 24). Adversary tradecraft 101: Hunting for persistence using Elastic Security (Part 1). Retrieved December 21, 2020. ↩
-
Counter Threat Unit Research Team. (2016, June 6). Malware Lingers with BITS. Retrieved January 12, 2018. ↩
-
Microsoft. (2020, December). Azure Sentinel Detections. Retrieved December 30, 2020. ↩
-
Microsoft. (2020, September 14). Update or repair the settings of a federated domain in Office 365, Azure, or Intune. Retrieved December 30, 2020. ↩
-
Fox, C., Vangel, D. (2018, April 22). Detect and Remediate Outlook Rules and Custom Forms Injections Attacks in Office 365. Retrieved February 4, 2019. ↩
-
SensePost. (2017, September 21). NotRuler - The opposite of Ruler, provides blue teams with the ability to detect Ruler usage against Exchange. Retrieved February 4, 2019. ↩
-
Microsoft. (2023, February 22). Manage mail flow rules in Exchange Online. Retrieved March 13, 2023. ↩
-
Johann Rehberger. (2021, April 18). Spoofing credential dialogs on macOS Linux and Windows. Retrieved August 19, 2021. ↩
-
Carr, N., Sellmer, S. (2021, June 14). Behind the scenes of business email compromise: Using cross-domain threat data to disrupt a large BEC campaign. Retrieved June 15, 2021. ↩
-
Graeber, M. (2017, December 22). Code Signing Certificate Cloning Attacks and Defenses. Retrieved April 3, 2018. ↩
-
Russinovich, M. et al.. (2017, May 22). Sigcheck. Retrieved April 3, 2018. ↩
-
Microsoft 365 Defender Team. (2020, December 28). Using Microsoft 365 Defender to protect against Solorigate. Retrieved January 7, 2021. ↩
-
Microsfot. (2016, August 21). Cached and Stored Credentials Technical Overview. Retrieved February 21, 2020. ↩
-
Chrome Enterprise and Education Help. (n.d.). Use Chrome Browser with Roaming User Profiles. Retrieved March 28, 2023. ↩
-
Cisco. (n.d.). Cisco IOS Software Integrity Assurance - Command History. Retrieved October 21, 2020. ↩
-
Pravs. (2009, May 25). What you need to know about alternate data streams in windows? Is your Data secure? Can you restore that?. Retrieved March 21, 2018. ↩
-
Arntz, P. (2015, July 22). Introduction to Alternate Data Streams. Retrieved March 21, 2018. ↩
-
Marlin, J. (2013, March 24). Alternate Data Streams in NTFS. Retrieved March 21, 2018. ↩
-
Johann Rehberger. (2020, September 23). Beware of the Shadowbunny - Using virtual machines to persist and evade detections. Retrieved September 22, 2021. ↩
-
Arntz, P. (2016, March 30). The Windows Vault . Retrieved November 23, 2020. ↩
-
Malware Archaeology. (2016, June). WINDOWS POWERSHELL LOGGING CHEAT SHEET - Win 7/Win 2008 or later. Retrieved June 24, 2016. ↩
-
Dunwoody, M. (2016, February 11). GREATER VISIBILITY THROUGH POWERSHELL LOGGING. Retrieved February 16, 2016. ↩
-
Nolen, R. et al.. (2016, April 28). Threat Advisory: “Squiblydoo” Continues Trend of Attackers Using Native OS Tools to “Live off the Land”. Retrieved April 9, 2018. ↩
-
Microsoft. (2021, February 15). Enable Loading of Test Signed Drivers. Retrieved April 22, 2021. ↩
-
Adrien Bataille, Anders Vejlby, Jared Scott Wilson, and Nader Zaveri. (2021, December 14). Azure Run Command for Dummies. Retrieved March 13, 2023. ↩
-
French, D. (2018, September 30). Detecting Lateral Movement Using Sysmon and Splunk. Retrieved October 11, 2019. ↩
-
Apple. (2019, May 3). Configuration Profile Reference. Retrieved September 23, 2021. ↩
-
Chuvakin, A. (2003, February). An Overview of Rootkits. Retrieved April 6, 2018. ↩
-
Henderson, B. (2006, September 24). How To Insert And Remove LKMs. Retrieved April 9, 2018. ↩
-
Pikeralpha. (2017, August 29). User Approved Kernel Extension Loading…. Retrieved September 23, 2021. ↩
-
Remillano, A., Urbanec, J. (2019, September 19). Skidmap Linux Malware Uses Rootkit Capabilities to Hide Cryptocurrency-Mining Payload. Retrieved June 4, 2020. ↩
-
Richard Purves. (2017, November 9). MDM and the Kextpocalypse . Retrieved September 23, 2021. ↩
-
Lambert, J. (2020, December 13). Important steps for customers to protect themselves from recent nation-state cyberattacks. Retrieved December 17, 2020. ↩
-
Mathers, B. (2017, March 7). Command line process auditing. Retrieved April 21, 2017. ↩
-
Phil Stokes. (2021, February 16). 20 Common Tools & Techniques Used by macOS Threat Actors & Malware. Retrieved August 23, 2021. ↩
-
Microsoft. (2007, November 24). IIS Modules Overview. Retrieved June 17, 2021. ↩
-
Falcone, R. (2018, January 25). OilRig uses RGDoor IIS Backdoor on Targets in the Middle East. Retrieved July 6, 2018. ↩
-
Hromcová, Z., Cherepanov, A. (2021). Anatomy of Native IIS Malware. Retrieved September 9, 2021. ↩
-
Damian Pfammatter. (2018, September 17). Hidden Inbox Rules in Microsoft Exchange. Retrieved October 12, 2021. ↩
-
Schroeder, W. & Christensen, L. (2021, June 22). Certified Pre-Owned - Abusing Active Directory Certificate Services. Retrieved August 2, 2022. ↩
-
Carr, N.. (2018, October 25). Nick Carr Status Update Masquerading. Retrieved April 22, 2019. ↩
-
Microsoft. (2021, May 27). bcdedit. Retrieved June 23, 2021. ↩
-
Gerend, J. et al. (2017, October 16). bootcfg. Retrieved August 30, 2021. ↩
-
Sophos. (2019, December 9). Snatch ransomware reboots PCs into Safe Mode to bypass protection. Retrieved June 23, 2021. ↩
-
Russinovich, M. & Garnier, T. (2017, May 22). Sysmon v6.20. Retrieved December 13, 2017. ↩
-
Dennis German. (2020, November 20). launchd Keywords for plists. Retrieved October 7, 2021. ↩
-
Chandel, R. (2021, April 22). Defense Evasion: Windows Event Logging (T1562.002). Retrieved September 14, 2021. ↩
-
Heiligenstein, L. (n.d.). REP-25: Disable Windows Event Logging. Retrieved April 7, 2022. ↩
-
svch0st. (2020, September 30). Event Log Tampering Part 1: Disrupting the EventLog Service. Retrieved September 14, 2021. ↩
-
Mercer, W. and Rascagneres, P. (2018, February 12). Olympic Destroyer Takes Aim At Winter Olympics. Retrieved March 14, 2019. ↩
-
Mercês, F. (2014, January 27). CPL Malware - Malicious Control Panel Items. Retrieved January 18, 2018. ↩
-
French, D. (2018, October 9). Detecting & Removing an Attacker’s WMI Persistence. Retrieved October 11, 2019. ↩
-
ise. (2019, February 19). Password Managers: Under the Hood of Secrets Management. Retrieved January 22, 2021. ↩