C0025 2016 Ukraine Electric Power Attack

During the 2016 Ukraine Electric Power Attack, Sandworm Team used the xp_cmdshell command in MS-SQL.[2]

S0065 4H RAT

4H RAT has the capability to create a remote shell.[3]

S0469 ABK

ABK has the ability to use cmd to run a Portable Executable (PE) on the compromised host.[4]

S1028 Action RAT

Action RAT can use cmd.exe to execute commands on an infected host.[5]

S0202 adbupd

adbupd can run a copy of cmd.exe.[6]

G0018 admin@338

Following exploitation with LOWBALL malware, admin@338 actors created a file containing a list of commands to be executed on the compromised computer.[7]

S0045 ADVSTORESHELL

ADVSTORESHELL can create a remote shell and run a given command.[8][9]

G1030 Agrius

Agrius uses ASPXSpy web shells to enable follow-on command execution via cmd.exe.[10]

S1129 Akira

Akira executes from the Windows command line and can take various arguments for execution.[11]

S0504 Anchor

Anchor has used cmd.exe to run its self deletion routine.[12]

G0006 APT1

APT1 has used the Windows command shell to execute commands, and batch scripting to automate execution.[13]

G0026 APT18

APT18 uses cmd.exe to execute commands on the victim’s machine.[14][15]

G0007 APT28

An APT28 loader Trojan uses a cmd.exe and batch script to run its payload.[16] The group has also used macros to execute payloads.[17][18][19][20]

G0022 APT3

An APT3 downloader uses the Windows command "cmd.exe" /C whoami. The group also uses a tool to execute commands on remote computers.[21][22]

G0050 APT32

APT32 has used cmd.exe for execution.[23]

G0067 APT37

APT37 has used the command-line interface.[24][25]

G0082 APT38

APT38 has used a command-line tunneler, NACHOCHEESE, to give them shell access to a victim’s machine.[26]

G0096 APT41

APT41 used cmd.exe /c to execute commands on remote machines.[27]APT41 used a batch file to install persistence for the Cobalt Strike BEACON loader.[28]

G1023 APT5

APT5 has used cmd.exe for execution on compromised systems.[29]

G0143 Aquatic Panda

Aquatic Panda has attempted and failed to run Bash commands on a Windows host by passing them to cmd /C.[30]

S0373 Astaroth

Astaroth spawns a CMD process to execute commands. [31]

S0347 AuditCred

AuditCred can open a reverse shell on the system to execute commands.[32]

S1029 AuTo Stealer

AuTo Stealer can use cmd.exe to execute a created batch file.[5]

S0638 Babuk

Babuk has the ability to use the command line to control execution on compromised hosts.[33][34]

S0414 BabyShark

BabyShark has used cmd.exe to execute commands.[35]

S0475 BackConfig

BackConfig can download and run batch files to execute commands on a compromised host.[36]

S0031 BACKSPACE

Adversaries can direct BACKSPACE to execute from the command line on infected hosts, or have BACKSPACE create a reverse shell.[37]

S1081 BADHATCH

BADHATCH can use cmd.exe to execute commands on a compromised host.[38][39]

S0128 BADNEWS

BADNEWS is capable of executing commands via cmd.exe.[40][41]

S0234 Bandook

Bandook is capable of spawning a Windows command shell.[42][43]

S0239 Bankshot

Bankshot uses the command-line interface to execute arbitrary commands.[44][45]

S0534 Bazar

Bazar can launch cmd.exe to perform reconnaissance commands.[46][47]

S0470 BBK

BBK has the ability to use cmd to run a Portable Executable (PE) on the compromised host.[4]

S0017 BISCUIT

BISCUIT has a command to launch a command shell on the system.[48]

S0268 Bisonal

Bisonal has launched cmd.exe and used the ShellExecuteW() API function to execute commands on the system.[49][50][51]

S1070 Black Basta

Black Basta can use cmd.exe to enable shadow copy deletion.[52]

S1068 BlackCat

BlackCat can execute commands on a compromised network with the use of cmd.exe.[53]

S0069 BLACKCOFFEE

BLACKCOFFEE has the capability to create a reverse shell.[54]

S0564 BlackMould

BlackMould can run cmd.exe with parameters.[55]

S0520 BLINDINGCAN

BLINDINGCAN has executed commands via cmd.exe.[56]

G0108 Blue Mockingbird

Blue Mockingbird has used batch script files to automate execution and deployment of payloads.[57]

S0360 BONDUPDATER

BONDUPDATER can read batch commands in a file sent from its C2 server and execute them with cmd.exe.[58]

S0651 BoxCaon

BoxCaon can execute arbitrary commands and utilize the "ComSpec" environment variable.[59]

G0060 BRONZE BUTLER

BRONZE BUTLER has used batch scripts and the command-line interface for execution.[60]

S1063 Brute Ratel C4

Brute Ratel C4 can use cmd.exe for execution.[61]

S1039 Bumblebee

Bumblebee can use cmd.exe to drop and run files.[62][63]

C0015 C0015

During C0015, the threat actors used cmd.exe to execute commands and run malicious binaries.[64]

C0017 C0017

During C0017, APT41 used cmd.exe to execute reconnaissance commands.[65]

S0025 CALENDAR

CALENDAR has a command to run cmd.exe to execute commands.[48]

S0030 Carbanak

Carbanak has a command to create a reverse shell.[66]

S0348 Cardinal RAT

Cardinal RAT can execute commands.[67]

S0462 CARROTBAT

CARROTBAT has the ability to execute command line arguments on a compromised host.[68]

S0572 Caterpillar WebShell

Caterpillar WebShell can run commands on the compromised asset with CMD functions.[69]

S1043 ccf32

ccf32 has used cmd.exe for archiving data and deleting files.[70]

S0631 Chaes

Chaes has used cmd to execute tasks on the system.[71]

S0674 CharmPower

The C# implementation of the CharmPower command execution module can use cmd.[72]

G0114 Chimera

Chimera has used the Windows Command Shell and batch scripts for execution on compromised hosts.[73]

S0020 China Chopper

China Chopper's server component is capable of opening a command terminal.[74][75][76]

G1021 Cinnamon Tempest

Cinnamon Tempest has executed ransomware using batch scripts deployed via GPO.[77]

S0660 Clambling

Clambling can use cmd.exe for command execution.[78]

S0611 Clop

Clop can use cmd.exe to help execute commands on the system.[79]

S0106 cmd

cmd is used to execute programs and other actions at the command-line interface.[80]

G0080 Cobalt Group

Cobalt Group has used a JavaScript backdoor that is capable of launching cmd.exe to execute shell commands.[81] The group has used an exploit toolkit known as Threadkit that launches .bat files.[82][83][84][81][85][86]

S0154 Cobalt Strike

Cobalt Strike uses a command-line interface to interact with systems.[87][88][89][90]

S0338 Cobian RAT

Cobian RAT can launch a remote command shell interface for executing commands.[91]

S0369 CoinTicker

CoinTicker executes a bash script to establish a reverse shell.[92]

S0244 Comnie

Comnie executes BAT scripts.[93]

S0126 ComRAT

ComRAT has used cmd.exe to execute commands.[94]

S0575 Conti

Conti can utilize command line options to allow an attacker control over how it scans and encrypts files.[95][64]

S1155 Covenant

Covenant provides access to a Command Shell in Windows environments for follow-on command execution and tasking.[96]

S0046 CozyCar

A module in CozyCar allows arbitrary commands to be executed by invoking C:\Windows\System32\cmd.exe.[97]

S0115 Crimson

Crimson has the ability to execute commands with the COMSPEC environment variable.[98]

S0625 Cuba

Cuba has used cmd.exe /c and batch files for execution.[99]

S1014 DanBot

DanBot has the ability to execute arbitrary commands via cmd.exe.[100][101]

G0070 Dark Caracal

Dark Caracal has used macros in Word documents that would download a second stage if executed.[102]

S0334 DarkComet

DarkComet can launch a remote shell to execute commands on the victim’s machine.[103]

S1111 DarkGate

DarkGate uses a malicious Windows Batch script to run the Windows code utility to retrieve follow-on script payloads.[104]

G0012 Darkhotel

Darkhotel has dropped an mspaint.lnk shortcut to disk which launches a shell script that downloads and executes a file.[105]

S1066 DarkTortilla

DarkTortilla can use cmd.exe to add registry keys for persistence.[106]

S0673 DarkWatchman

DarkWatchman can use cmd.exe to execute commands.[107]

S0187 Daserf

Daserf can execute shell commands.[108][60]

S1052 DEADEYE

DEADEYE can run cmd /c copy /y /b C:\Users\public\syslog_6-*.dat C:\Users\public\syslog.dll to combine separated sections of code into a single DLL prior to execution.[65]

S0243 DealersChoice

DealersChoice makes modifications to open-source scripts from GitHub and executes them on the victim’s machine.[109]

S0354 Denis

Denis can launch a remote shell to execute arbitrary commands on the victim’s machine.[110][23]

S0200 Dipsind

Dipsind can spawn remote shells.[6]

S1021 DnsSystem

DnsSystem can use cmd.exe for execution.[111]

S0186 DownPaper

DownPaper uses the command line.[112]

G0035 Dragonfly

Dragonfly has used various types of scripting to perform operations, including batch scripts.[113]

S0547 DropBook

DropBook can execute arbitrary shell commands on the victims' machines.[114][115]

S0567 Dtrack

Dtrack has used cmd.exe to add a persistent service.[116]

S1159 DUSTTRAP

DUSTTRAP can execute commands via cmd.exe.[117]

S0593 ECCENTRICBANDWAGON

ECCENTRICBANDWAGON can use cmd to execute commands on a victim’s machine.[118]

S0554 Egregor

Egregor has used batch files for execution and can launch Internet Explorer from cmd.exe.[119][120]

S0082 Emissary

Emissary has the capability to create a remote shell and execute specified commands.[121]

S0367 Emotet

Emotet has used cmd.exe to run a PowerShell script. [122]

S0363 Empire

Empire has modules for executing scripts.[123]

S0634 EnvyScout

EnvyScout can use cmd.exe to execute malicious files on compromised hosts.[124]

S0396 EvilBunny

EvilBunny has an integrated scripting engine to download and execute Lua scripts.[125]

S0343 Exaramel for Windows

Exaramel for Windows has a command to launch a remote shell and executes commands on the victim’s machine.[126]

S0171 Felismus

Felismus uses command line for execution.[127]

S0267 FELIXROOT

FELIXROOT executes batch scripts on the victim’s machine, and can launch a reverse shell for command execution.[128][129]

G0051 FIN10

FIN10 has executed malicious .bat files containing PowerShell commands.[130]

G1016 FIN13

FIN13 has leveraged xp_cmdshell and Windows Command Shell to execute commands on a compromised machine. FIN13 has also attempted to leverage the ‘xp_cmdshell’ SQL procedure to execute remote commands on internal MS-SQL servers.[131][132]

G0037 FIN6

FIN6 has used kill.bat script to disable security tools.[133]

G0046 FIN7

FIN7 used the command prompt to launch commands on the victim’s machine.[134][135][136]

G0061 FIN8

FIN8 has used a Batch file to automate frequently executed post compromise cleanup activities.[137] FIN8 has also executed commands remotely via cmd.exe.[138][139][140]

S0696 Flagpro

Flagpro can use cmd.exe to execute commands received from C2.[141]

S0381 FlawedAmmyy

FlawedAmmyy has used cmd to execute commands on a compromised host.[142]

G0117 Fox Kitten

Fox Kitten has used cmd.exe likely as a password changing mechanism.[143]

C0001 Frankenstein

During Frankenstein, the threat actors ran a command script to set up persistence as a scheduled task named "WinUpdate", as well as other encoded commands from the command-line [144]

S1044 FunnyDream

FunnyDream can use cmd.exe for execution on remote hosts.[70]

C0007 FunnyDream

During FunnyDream, the threat actors used cmd.exe to execute the wmiexec.vbs script.[70]

G0093 GALLIUM

GALLIUM used the Windows command shell to execute commands.[145]

G0047 Gamaredon Group

Gamaredon Group has used various batch scripts to establish C2 and download additional files. Gamaredon Group's backdoor malware has also been written to a batch file.[146][147][148][149]

S0666 Gelsemium

Gelsemium can use a batch script to delete itself.[150]

S0249 Gold Dragon

Gold Dragon uses cmd.exe to execute commands for discovery.[151]

S0493 GoldenSpy

GoldenSpy can execute remote commands via the command-line interface.[152]

S0588 GoldMax

GoldMax can spawn a command shell, and execute native commands.[153][154]

S0477 Goopy

Goopy has the ability to use cmd.exe to execute commands passed from an Outlook C2 channel.[23]

G0078 Gorgon Group

Gorgon Group malware can use cmd.exe to download and execute payloads and to execute commands on the system.[155]

S0237 GravityRAT

GravityRAT executes commands remotely on the infected host.[156]

S0342 GreyEnergy

GreyEnergy uses cmd.exe to execute itself in-memory.[129]

S0632 GrimAgent

GrimAgent can use the Windows Command Shell to execute commands, including its own removal.[157]

S0132 H1N1

H1N1 kills and disables services by using cmd.exe.[158]

G0125 HAFNIUM

HAFNIUM has used cmd.exe to execute commands on the victim's machine.[159]

S0246 HARDRAIN

HARDRAIN uses cmd.exe to execute netshcommands.[160]

S0391 HAWKBALL

HAWKBALL has created a cmd.exe reverse shell, executed commands, and uploaded output via the command line.[161]

S0071 hcdLoader

hcdLoader provides command-line access to the compromised system.[162]

S0170 Helminth

Helminth can provide a remote shell. One version of Helminth uses batch scripting.[163]

S0697 HermeticWiper

HermeticWiper can use cmd.exe /Q/c move CSIDL_SYSTEM_DRIVE\temp\sys.tmp1 CSIDL_WINDOWS\policydefinitions\postgresql.exe 1> \\127.0.0.1\ADMIN$\_1636727589.6007507 2>&1 to deploy on an infected system.[164]

S0698 HermeticWizard

HermeticWizard can use cmd.exe for execution on compromised hosts.[164]

S0087 Hi-Zor

Hi-Zor has the ability to create a reverse shell.[165]

S0394 HiddenWasp

HiddenWasp uses a script to automate tasks on the victim's machine and to assist in execution.[166]

G0126 Higaisa

Higaisa used cmd.exe for execution.[167][168][169]

S0009 Hikit

Hikit has the ability to create a remote shell and run given commands.[170]

S0232 HOMEFRY

HOMEFRY uses a command-line interface.[171]

C0038 HomeLand Justice

During HomeLand Justice, threat actors used Windows batch files for persistence and execution.[172][173]

S0376 HOPLIGHT

HOPLIGHT can launch cmd.exe to execute commands on the system.[174]

S0431 HotCroissant

HotCroissant can remotely open applications on the infected host with the ShellExecuteA command.[175]

S0070 HTTPBrowser

HTTPBrowser is capable of spawning a reverse shell on a victim.[176]

S0068 httpclient

httpclient opens cmd.exe on the victim.[3]

G1032 INC Ransom

INC Ransom has used cmd.exe to launch malicious payloads.[177]

G0119 Indrik Spider

Indrik Spider has used batch scripts on victim's machines.[178][179]

S0259 InnaputRAT

InnaputRAT launches a shell to execute commands on the victim’s machine.[180]

S0260 InvisiMole

InvisiMole can launch a remote shell to execute commands.[181][182]

S1132 IPsec Helper

IPsec Helper can run arbitrary commands passed to it through cmd.exe.[10]

S0015 Ixeshe

Ixeshe is capable of executing commands via cmd.[183]

S0389 JCry

JCry has used cmd.exe to launch PowerShell.[184]

S0044 JHUHUGIT

JHUHUGIT uses a .bat file to execute a .dll.[17]

S0201 JPIN

JPIN can use the command-line utility cacls.exe to change file permissions.[6]

S0283 jRAT

jRAT has command line access.[185]

S0088 Kasidet

Kasidet can execute commands using cmd.exe.[186]

S0265 Kazuar

Kazuar uses cmd.exe to execute commands on the victim’s machine.[187]

G0004 Ke3chang

Ke3chang has used batch scripts in its malware to install persistence mechanisms.[188]

S1020 Kevin

Kevin can use a renamed image of cmd.exe for execution.[189]

S0387 KeyBoy

KeyBoy can launch interactive shells for communicating with the victim machine.[190][191]

S0271 KEYMARBLE

KEYMARBLE can execute shell commands using cmd.exe.[192]

S0526 KGH_SPY

KGH_SPY has the ability to set a Registry key to run a cmd.exe command.[193]

G0094 Kimsuky

Kimsuky has executed Windows commands by using cmd and running batch scripts.[194][195]

S0250 Koadic

Koadic can open an interactive command-shell to perform command line functions on victim machines. Koadic performs most of its operations using Windows Script Host (Jscript) and to run arbitrary shellcode.[196][197]

S0669 KOCTOPUS

KOCTOPUS has used cmd.exe and batch files for execution.[197]

S0156 KOMPROGO

KOMPROGO is capable of creating a reverse shell.[198]

S0356 KONNI

KONNI has used cmd.exe to execute arbitrary commands on the infected host across different stages of the infection chain.[199][200][201]

S1160 Latrodectus

The Latrodectus command handler can use cmdexe to run multiple discovery commands.[202][203]

G0032 Lazarus Group

Lazarus Group malware uses cmd.exe to execute commands on a compromised host.[204][205][206][207][208] A Destover-like variant used by Lazarus Group uses a batch file mechanism to delete its binaries from the system.[209]

G0140 LazyScripter

LazyScripter has used batch files to deploy open-source and multi-stage RATs.[197]

S0395 LightNeuron

LightNeuron is capable of executing commands via cmd.exe.[210]

S0211 Linfo

Linfo creates a backdoor through which remote attackers can start a remote shell.[211]

S0681 Lizar

Lizar has a command to open the command-line on the infected system.[212][213]

S0447 Lokibot

Lokibot has used cmd /c commands embedded within batch scripts.[214]

S0582 LookBack

LookBack executes the cmd.exe command.[215]

S0451 LoudMiner

LoudMiner used a batch script to run the Linux virtual machine as a service.[216]

S0532 Lucifer

Lucifer can issue shell commands to download and execute additional payloads.[217]

S1141 LunarWeb

LunarWeb can run shell commands using a BAT file with a name matching %TEMP%\<⁠random_9_alnum_chars>.batfile or through cmd.exe with the /c and /U option for Unicode output.[218]

G0095 Machete

Machete has used batch files to initiate additional downloads of malicious files.[219]

S1060 Mafalda

Mafalda can execute shell commands using cmd.exe.[220]

G0059 Magic Hound

Magic Hound has used the command-line interface for code execution.[221][222][223]

S1156 Manjusaka

Manjusaka can execute arbitrary commands passed to it from the C2 controller via cmd.exe /c.[224]

S0652 MarkiRAT

MarkiRAT can utilize cmd.exe to execute commands in a victim's environment.[225]

S0449 Maze

The Maze encryption process has used batch scripts with various commands.[226][227]

S0500 MCMD

MCMD can launch a console process (cmd.exe) with redirected standard input and output.[228]

S0459 MechaFlounder

MechaFlounder has the ability to run commands on a compromised host.[229]

S0576 MegaCortex

MegaCortex has used .cmd scripts on the victim's system.[230]

G0045 menuPass

menuPass executes commands using a command-line interface and reverse shell. The group has used a modified version of pentesting script wmiexec.vbs to execute commands.[231][232][233][234] menuPass has used malicious macros embedded inside Office documents to execute files.[235][234]

G1013 Metador

Metador has used the Windows command line to execute commands.[236]

S0455 Metamorfo

Metamorfo has used cmd.exe /c to execute files.[237]

S0688 Meteor

Meteor can run set.bat, update.bat, cache.bat, bcd.bat, msrun.bat, and similar scripts.[238]

S0339 Micropsia

Micropsia creates a command-line shell using cmd.exe.[239]

S1015 Milan

Milan can use cmd.exe for discovery actions on a targeted system.[101]

S0280 MirageFox

MirageFox has the capability to execute commands using cmd.exe.[240]

S0084 Mis-Type

Mis-Type has used cmd.exe to run commands on a compromised host.[241]

S0083 Misdat

Misdat is capable of providing shell functionality to the attacker to execute commands.[241]

S0080 Mivast

Mivast has the capability to open a remote shell and run basic commands.[242]

S0553 MoleNet

MoleNet can execute commands via the command line utility.[114]

S0149 MoonWind

MoonWind can execute commands via an interactive command shell.[243] MoonWind uses batch scripts for various purposes, including to restart and uninstall itself.[243]

S0284 More_eggs

More_eggs has used cmd.exe for execution.[244][245]

S0256 Mosquito

Mosquito executes cmd.exe and uses a pipe to read the results and send back the output to the C2 server.[246]

G0069 MuddyWater

MuddyWater has used a custom tool for creating reverse shells.[247]

S1135 MultiLayer Wiper

MultiLayer Wiper uses a batch script launched via a scheduled task to delete Windows Event Logs.[248]

S0233 MURKYTOP

MURKYTOP uses the command-line interface.[171]

G0129 Mustang Panda

Mustang Panda has executed HTA files via cmd.exe, and used batch scripts for collection.[249][250]

S0336 NanoCore

NanoCore can open a remote command-line interface and execute commands.[251] NanoCore uses JavaScript files.[252]

S0247 NavRAT

NavRAT leverages cmd.exe to perform discovery techniques.[253] NavRAT loads malicious shellcode and executes it in memory.[253]

S0630 Nebulae

Nebulae can use CMD to execute a process.[254]

S0034 NETEAGLE

NETEAGLE allows adversaries to execute shell commands on the infected host.[37]

S0457 Netwalker

Operators deploying Netwalker have used batch scripts to retrieve the Netwalker payload.[255]

S0198 NETWIRE

NETWIRE can issue commands using cmd.exe.[256][257]

C0002 Night Dragon

During Night Dragon, threat actors used zwShell to establish full remote control of the connected machine and run command-line shells.[258]

S1147 Nightdoor

Nightdoor creates a cmd.exe shell to send and receive commands from the command and control server via open pipes.[259]

S0385 njRAT

njRAT can launch a command shell interface for executing commands.[260]

G0133 Nomadic Octopus

Nomadic Octopus used cmd.exe /c within a malicious macro.[261]

S0346 OceanSalt

OceanSalt can create a reverse shell on the infected endpoint using cmd.exe.[262] OceanSalt has been executed via malicious macros.[262]

G0049 OilRig

OilRig has used macros to deliver malware such as QUADAGENT and OopsIE.[263][264][265][266][267] OilRig has used batch scripts.[263][264][265][266][267]

S0439 Okrum

Okrum's backdoor has used cmd.exe to execute arbitrary commands as well as batch scripts to update itself to a newer version.[268]

S0264 OopsIE

OopsIE uses the command prompt to execute commands on the victim's machine.[265][269]

C0012 Operation CuckooBees

During Operation CuckooBees, the threat actors used batch scripts to perform reconnaissance.[270]

C0022 Operation Dream Job

During Operation Dream Job, Lazarus Group launched malicious DLL files, created new folders, and renamed folders with the use of the Windows command shell.[271][272]

C0006 Operation Honeybee

During Operation Honeybee, various implants used batch scripting and cmd.exe for execution.[273]

C0014 Operation Wocao

During Operation Wocao, threat actors spawned a new cmd.exe process to execute commands.[274]

S0229 Orz

Orz can execute shell commands.[275] Orz can execute commands with JavaScript.[275]

S0594 Out1

Out1 can use native command line for execution.[276]

S1017 OutSteel

OutSteel has used cmd.exe to scan a compromised host for specific file extensions.[277]

G0040 Patchwork

Patchwork ran a reverse shell with Meterpreter.[278] Patchwork used JavaScript code and .SCT files on victim machines.[41][279]

S1050 PcShare

PcShare can execute cmd commands on a compromised host.[70]

S0643 Peppy

Peppy has the ability to execute shell commands.[280]

S0158 PHOREAL

PHOREAL is capable of creating reverse shell.[198]

S1145 Pikabot

Pikabot can execute Windows shell commands via cmd.exe.[281]

S1031 PingPull

PingPull can use cmd.exe to run various commands as a reverse shell.[282]

S0124 Pisloader

Pisloader uses cmd.exe to set the Registry Run key value. It also has a command to spawn a command shell.[283]

S0254 PLAINTEE

PLAINTEE uses cmd.exe to execute commands on the victim’s machine.[284]

G1040 Play

Play has used a batch script to remove indicators of its presence on compromised hosts.[285]

S0435 PLEAD

PLEAD has the ability to execute shell commands on the compromised host.[286]

S0013 PlugX

PlugX allows actors to spawn a reverse shell on a victim.[176][287]

S0428 PoetRAT

PoetRAT has called cmd through a Word document macro.[288]

S0012 PoisonIvy

PoisonIvy creates a backdoor through which remote attackers can open a command-line interface.[289]

S0453 Pony

Pony has used batch scripts to delete itself after execution.[290]

S0139 PowerDuke

PowerDuke runs cmd.exe /c and sends the output to its C2.[291]

S0184 POWRUNER

POWRUNER can execute commands from its C2 server.[263]

S0238 Proxysvc

Proxysvc executes a binary on the system and logs the results into a temp file by using: cmd.exe /c " > %temp%\PM* .tmp 2>&1".[209]

S0147 Pteranodon

Pteranodon can use cmd.exe for execution on victim systems.[146][292]

S1032 PyDCrypt

PyDCrypt has used cmd.exe for execution.[293]

S0650 QakBot

QakBot can use cmd.exe to launch itself and to execute multiple C2 commands.[294][295][296][90]

S0269 QUADAGENT

QUADAGENT uses cmd.exe to execute scripts and commands on the victim’s machine.[266]

S0262 QuasarRAT

QuasarRAT can launch a remote shell to execute commands on the victim’s machine.[297][298]

S0481 Ragnar Locker

Ragnar Locker has used cmd.exe and batch scripts to execute commands.[299]

S0629 RainyDay

RainyDay can use the Windows Command Shell for execution.[254]

G0075 Rancor

Rancor has used cmd.exe to execute commmands.[284]

S1130 Raspberry Robin

Raspberry Robin uses cmd.exe to read and execute a file stored on an infected USB device as part of initial installation.[300]

S0241 RATANKBA

RATANKBA uses cmd.exe to execute commands.[301][302]

S0662 RCSession

RCSession can use cmd.exe for execution on compromised hosts.[78]

S0495 RDAT

RDAT has executed commands using cmd.exe /c.[303]

G1039 RedCurl

RedCurl has used the Windows Command Prompt to execute commands.[304][305][306]

S0153 RedLeaves

RedLeaves can receive and execute commands with cmd.exe. It can also provide a reverse shell.[232][307]

S0332 Remcos

Remcos can launch a remote command line to execute commands on the victim’s machine.[308]

S0375 Remexi

Remexi silently executes received commands with cmd.exe.[309]

S0379 Revenge RAT

Revenge RAT uses cmd.exe to execute commands and run scripts on the victim's machine.[310]

S0496 REvil

REvil can use the Windows command line to delete volume shadow copies and disable recovery.[311][312][313][314]

S0258 RGDoor

RGDoor uses cmd.exe to execute commands on the victim’s machine.[315]

S0448 Rising Sun

Rising Sun has executed commands using cmd.exe /c "<command> > <%temp%>\AM<random>. tmp" 2>&1.[316]

S1150 ROADSWEEP

ROADSWEEP can open cmd.exe to enable command execution.[317][173]

S0400 RobbinHood

RobbinHood uses cmd.exe on the victim's computer.[318]

S0270 RogueRobin

RogueRobin uses Windows Script Components.[319][320]

S0148 RTM

RTM uses the command line and rundll32.exe to execute.[321]

S0253 RunningRAT

RunningRAT uses a batch file to kill a security program task and then attempts to remove itself.[151]

S0446 Ryuk

Ryuk has used cmd.exe to create a Registry entry to establish persistence.[322]

S0085 S-Type

S-Type has provided the ability to execute shell commands on a compromised host.[241]

G1031 Saint Bear

Saint Bear initial loaders will also drop a malicious Windows batch file, available via open source GitHub repositories, that disables Microsoft Defender functionality.[277]

S1018 Saint Bot

Saint Bot has used cmd.exe and .bat scripts for execution.[277]

S0074 Sakula

Sakula calls cmd.exe to run various DLL files via rundll32 and also to perform file cleanup. Sakula also has the capability to invoke a reverse shell.[323]

S0370 SamSam

SamSam uses custom batch scripts to execute some of its components.[324]

S1099 Samurai

Samurai can use a remote command module for execution via the Windows command line.[325]

S1085 Sardonic

Sardonic has the ability to run cmd.exe or other interactive processes on a compromised computer.[140]

S0461 SDBbot

SDBbot has the ability to use the command shell to execute commands on a compromised host.[326]

S0053 SeaDuke

SeaDuke is capable of executing commands.[327]

S0345 Seasalt

Seasalt uses cmd.exe to create a reverse shell on the infected endpoint.[48]

S0185 SEASHARPEE

SEASHARPEE can execute commands on victims.[328]

S0382 ServHelper

ServHelper can execute shell commands against cmd.[329][330]

S0639 Seth-Locker

Seth-Locker can execute commands via the command line shell.[331]

S1019 Shark

Shark has the ability to use CMD to execute commands.[101][332]

S1089 SharpDisco

SharpDisco can use cmd.exe to execute plugins and to send command output to specified SMB shares.[333]

S0546 SharpStage

SharpStage can execute arbitrary commands with the command line.[114][115]

S0444 ShimRat

ShimRat can be issued a command shell function from the C2.[334]

S0610 SideTwist

SideTwist can execute shell commands on a compromised host.[335]

G0091 Silence

Silence has used Windows command-line to run commands.[336][337][338]

S0692 SILENTTRINITY

SILENTTRINITY can use cmd.exe to enable lateral movement using DCOM.[339]

S0623 Siloscape

Siloscape can run cmd through an IRC channel.[340]

S0533 SLOTHFULMEDIA

SLOTHFULMEDIA can open a command line to execute commands.[341]

S1035 Small Sieve

Small Sieve can use cmd.exe to execute commands on a victim's system.[342]

S0159 SNUGRIDE

SNUGRIDE is capable of executing commands and spawning a reverse shell.[307]

C0024 SolarWinds Compromise

During the SolarWinds Compromise, APT29 used cmd.exe to execute commands on remote machines.[343][344]

G0054 Sowbug

Sowbug has used command line during its intrusions.[345]

S0543 Spark

Spark can use cmd.exe to run commands.[346]

S0390 SQLRat

SQLRat has used SQL to execute JavaScript and VB scripts on the host system.[135]

S1030 Squirrelwaffle

Squirrelwaffle has used cmd.exe for execution.[347]

S1037 STARWHALE

STARWHALE has the ability to execute commands via cmd.exe.[348]

S0142 StreamEx

StreamEx has the ability to remotely execute commands.[349]

S1034 StrifeWater

StrifeWater can execute shell commands using cmd.exe.[350]

G0039 Suckfly

Several tools used by Suckfly have been command-line driven.[351]

S1049 SUGARUSH

SUGARUSH has used cmd for execution on an infected host.[352]

S0464 SYSCON

SYSCON has the ability to execute commands through cmd on a compromised host.[68]

G0092 TA505

TA505 has executed commands using cmd.exe.[353]

G0127 TA551

TA551 has used cmd.exe to execute commands.[354]

G1037 TA577

TA577 has used BAT files in malware execution chains.[355]

S0011 Taidoor

Taidoor can copy cmd.exe into the system temp folder.[356]

S0586 TAINTEDSCRIBE

TAINTEDSCRIBE can enable Windows CLI access and execute files.[357]

S1011 Tarrask

Tarrask may abuse the Windows schtasks command-line tool to create "hidden" scheduled tasks.[358]

S0164 TDTESS

TDTESS provides a reverse shell on the victim.[359]

G0139 TeamTNT

TeamTNT has used batch scripts to download tools and executing cryptocurrency miners.[360]

S0146 TEXTMATE

TEXTMATE executes cmd.exe to provide a reverse shell to adversaries.[361][362]

G0028 Threat Group-1314

Threat Group-1314 actors spawned shells on remote systems on a victim network to execute commands.[363]

G0027 Threat Group-3390

Threat Group-3390 has used command-line interfaces for execution.[74][364]

S0668 TinyTurla

TinyTurla has been installed using a .bat file.[365]

S0004 TinyZBot

TinyZBot supports execution from the command-line.[366]

G1022 ToddyCat

ToddyCat has used .bat scripts and cmd for execution on compromised hosts.[367]

S0266 TrickBot

TrickBot has used macros in Excel documents to download and deploy the malware on the user’s machine.[368]

S0094 Trojan.Karagany

Trojan.Karagany can perform reconnaissance commands on a victim machine via a cmd.exe process.[369]

G0081 Tropic Trooper

Tropic Trooper has used Windows command scripts.[370]

S0436 TSCookie

TSCookie has the ability to execute shell commands on the infected host.[371]

S0647 Turian

Turian can create a remote shell and execute commands using cmd.[372]

G0010 Turla

Turla RPC backdoors have used cmd.exe to execute commands.[373][374]

S0199 TURNEDUP

TURNEDUP is capable of creating a reverse shell.[375]

S0263 TYPEFRAME

TYPEFRAME can uninstall malware components using a batch script.[376] TYPEFRAME can execute commands using a shell.[376]

S0333 UBoatRAT

UBoatRAT can start a command shell.[377]

S0221 Umbreon

Umbreon provides access using both standard facilities like SSH and additional access using its backdoor Espeon, providing a reverse shell upon receipt of a special packet[378]

S0275 UPPERCUT

UPPERCUT uses cmd.exe to execute commands on the victim’s machine.[234]

S0022 Uroburos

Uroburos has the ability to use the command line for execution on the targeted system.[379]

S0452 USBferry

USBferry can execute various Windows commands.[370]

S0180 Volgmer

Volgmer can execute commands on the victim's machine.[380][381]

G1017 Volt Typhoon

Volt Typhoon has used the Windows command line to perform hands-on-keyboard activities in targeted environments including for discovery.[382][383][384][385]

S0670 WarzoneRAT

WarzoneRAT can use cmd.exe to execute malicious code.[386]

S0612 WastedLocker

WastedLocker has used cmd to execute commands on the system.[387]

C0037 Water Curupira Pikabot Distribution

Water Curupira Pikabot Distribution installation via JavaScript will launch follow-on commands via cmd.exe.[388]

S0109 WEBC2

WEBC2 can open an interactive command shell.[13]

S0514 WellMess

WellMess can execute command line scripts received from C2.[389]

S0689 WhisperGate

WhisperGate can use cmd.exe to execute commands.[390]

S0206 Wiarp

Wiarp creates a backdoor through which remote attackers can open a command line interface.[391]

G1035 Winter Vivern

Winter Vivern distributed Windows batch scripts disguised as virus scanners to prompt download of malicious payloads using built-in system tools.[392][393]

G0102 Wizard Spider

Wizard Spider has used cmd.exe to execute commands on a victim's machine.[394][395]

S1065 Woody RAT

Woody RAT can execute commands using cmd.exe.[396]

S0653 xCaon

xCaon has a command to start an interactive shell.[59]

S0117 XTunnel

XTunnel has been used to execute remote commands.[397]

S0251 Zebrocy

Zebrocy uses cmd.exe to execute commands on the system.[398][399]

S0330 Zeus Panda

Zeus Panda can launch an interface where it can execute several commands on the victim’s PC.[400]

G0128 ZIRCONIUM

ZIRCONIUM has used a tool to open a Windows Command Shell on a remote host.[401]

S0086 ZLib

ZLib has the ability to execute shell commands.[241]

S0350 zwShell

zwShell can launch command-line shells.[258]

S0412 ZxShell

ZxShell can launch a reverse command shell.[27][402][403]