Description
The Process Enumeration feature in malware provides attackers with a detailed inventory of all running processes on a compromised system. This is the digital equivalent of a burglar quietly taking stock of valuables in a home. By cataloging active processes, the malware gains insights into the software environment, including potential vulnerabilities and operational characteristics of the target system. This information can be invaluable for escalating privileges, inserting additional payloads, or avoiding detection by identifying security software that may be running. Process Enumeration thereby serves as a crucial intelligence-gathering step, arming attackers with the necessary data to tailor their subsequent actions for maximum impact and minimum detection.
| Categories | System Management, Disruption |
| Dangerousness | Medium |
Existing Techniques
| Name | Associated Feature(s) | Has Snippet | Matching Sample |
|---|---|---|---|
Loaded Modules Enumeration
|
Process Manager | 0 | |
Process Dump
|
Process Manager, Password Recovery | 0 | |
Process Information Gathering
|
Process Manager | 0 | |
Running Process Enumeration
|
Process Manager | 0 |
Loaded Modules Enumeration
Process Dump
Process Information Gathering
Running Process Enumeration
Back Orifice 1.20
NetBus 1.70
SubSeven 1.0
SubSeven 1.1
SubSeven 1.2
SubSeven 1.3
SubSeven 1.4
SubSeven 1.5
SubSeven 1.6
SubSeven 1.7
SubSeven 1.8
SubSeven 1.9
Back Orifice 2000 (BO2K) 1.0
SubSeven 1.9 Apocalypse
SubSeven 2.0
SchoolBus 2.0
SubSeven 2.1
SubSeven 2.1.1 GOLD edition
SubSeven 2.1.2 M.U.I.E
Y3K rat 1.0
SubSeven 2.1.3 BONUS
SubSeven 2.1.4 DEFCON 8
Y3K rat 1.5
SubSeven 2.2
Y3K rat 1.6 MS
Optix Pro 1.0
Net-Devil 1.5
Ghost 2.4
Beast 1.7
Beast 1.8
MoSucker 3.0b
Beast 1.90
Turkojan 1.0
Beast 1.91
Beast 1.92
SubSeven 2.1.5 Legends
CIA 1.0
CIA 1.1
Beast 2.00
Beast 2.01
LanFiltrator 1.1 Fix 1
Optix Pro 1.32
CIA 1.2
Beast 2.05
Beast 2.02
Sinique 1.0
Fearless Lite 1.01
ProRat 1.1
Hue 1.0
ProRat 1.2