Tool
Adversaries may buy, steal, or download software tools that can be used during targeting. Tools can be open or closed source, free or commercial. A tool can be used for malicious purposes by an adversary, but (unlike malware) were not intended to be used for those purposes (ex: [PsExec](https://attack.mitre.org/software/S0029)). Adversaries may obtain tools to support their operations, including to support execution of post-compromise behaviors. Tools may also be leveraged for testing – for ex...
BY SOURCE
PROCEDURES (10)
Auto-extracted: 4 detections for process creation monitoring
Auto-extracted: 1 detections for registry
Auto-extracted: 1 detections for dump
Auto-extracted: 1 detections for suspicious
Auto-extracted: 1 detections for suspicious
Auto-extracted: 1 detections for registry monitoring
Auto-extracted: 1 detections for general monitoring
Auto-extracted: 1 detections for credential
Auto-extracted: 1 detections for dump
Auto-extracted: 1 detections for credential