AppDomainManager - T1574.014 (356662f7-e315-4759-86c9-6214e2a50ff8)
Adversaries may execute their own malicious payloads by hijacking how the .NET AppDomainManager
loads assemblies. The .NET framework uses the AppDomainManager
class to create and manage one or more isolated runtime environments (called application domains) inside a process to host the execution of .NET applications. Assemblies (.exe
or .dll
binaries compiled to run as .NET code) may be loaded into an application domain as executable code.(Citation: Microsoft App Domains)
Known as "AppDomainManager injection," adversaries may execute arbitrary code by hijacking how .NET applications load assemblies. For example, malware may create a custom application domain inside a target process to load and execute an arbitrary assembly. Alternatively, configuration files (.config
) or process environment variables that define .NET runtime settings may be tampered with to instruct otherwise benign .NET applications to load a malicious assembly (identified by name) into the target process.(Citation: PenTestLabs AppDomainManagerInject)(Citation: PwC Yellow Liderc)(Citation: Rapid7 AppDomain Manager Injection)
Cluster A | Galaxy A | Cluster B | Galaxy B | Level |
---|---|---|---|---|
AppDomainManager - T1574.014 (356662f7-e315-4759-86c9-6214e2a50ff8) | Attack Pattern | Hijack Execution Flow - T1574 (aedfca76-3b30-4866-b2aa-0f1d7fd1e4b6) | Attack Pattern | 1 |