Skip to content

Hide Navigation Hide TOC

Process Suspension (c7271e9f-f0e6-5e03-bb4d-c02e65a5e3b2)

Suspending a running process on a computer system.

Cluster A Galaxy A Cluster B Galaxy B Level
LSA Secrets - T1003.004 (1ecfdab8-7d59-4c98-95d4-dc41970f57fc) Attack Pattern Process Suspension (c7271e9f-f0e6-5e03-bb4d-c02e65a5e3b2) MITRE D3FEND 1
Process Suspension (c7271e9f-f0e6-5e03-bb4d-c02e65a5e3b2) MITRE D3FEND Exploitation for Credential Access - T1212 (9c306d8d-cde7-4b4c-b6e8-d0bb16caca36) Attack Pattern 1
Process Suspension (c7271e9f-f0e6-5e03-bb4d-c02e65a5e3b2) MITRE D3FEND Netsh Helper DLL - T1546.007 (f63fe421-b1d1-45c0-b8a7-02cd16ff2bed) Attack Pattern 1
Process Suspension (c7271e9f-f0e6-5e03-bb4d-c02e65a5e3b2) MITRE D3FEND Use Alternate Authentication Material - T1550 (51a14c76-dd3b-440b-9c20-2bf91d25a814) Attack Pattern 1
Process Suspension (c7271e9f-f0e6-5e03-bb4d-c02e65a5e3b2) MITRE D3FEND Disable or Modify Tools - T1562.001 (ac08589e-ee59-4935-8667-d845e38fe579) Attack Pattern 1
Process Suspension (c7271e9f-f0e6-5e03-bb4d-c02e65a5e3b2) MITRE D3FEND Modify Authentication Process - T1556 (f4c1826f-a322-41cd-9557-562100848c84) Attack Pattern 1
Process Suspension (c7271e9f-f0e6-5e03-bb4d-c02e65a5e3b2) MITRE D3FEND LSASS Memory - T1003.001 (65f2d882-3f41-4d48-8a06-29af77ec9f90) Attack Pattern 1
Process Suspension (c7271e9f-f0e6-5e03-bb4d-c02e65a5e3b2) MITRE D3FEND Security Account Manager - T1003.002 (1644e709-12d2-41e5-a60f-3470991f5011) Attack Pattern 1
Process Suspension (c7271e9f-f0e6-5e03-bb4d-c02e65a5e3b2) MITRE D3FEND Scheduled Task - T1053.005 (005a06c6-14bf-4118-afa0-ebcd8aebb0c9) Attack Pattern 1
Process Suspension (c7271e9f-f0e6-5e03-bb4d-c02e65a5e3b2) MITRE D3FEND Scheduled Task/Job - T1053 (35dd844a-b219-4e2b-a6bb-efa9a75995a9) Attack Pattern 1
Process Suspension (c7271e9f-f0e6-5e03-bb4d-c02e65a5e3b2) MITRE D3FEND Transport Agent - T1505.002 (35187df2-31ed-43b6-a1f5-2f1d3d58d3f1) Attack Pattern 1
Process Suspension (c7271e9f-f0e6-5e03-bb4d-c02e65a5e3b2) MITRE D3FEND Web Shell - T1505.003 (5d0d3609-d06d-49e1-b9c9-b544e0c618cb) Attack Pattern 1
Process Suspension (c7271e9f-f0e6-5e03-bb4d-c02e65a5e3b2) MITRE D3FEND System Owner/User Discovery - T1033 (03d7999c-1f4c-42cc-8373-e7690d318104) Attack Pattern 1
LSA Secrets - T1003.004 (1ecfdab8-7d59-4c98-95d4-dc41970f57fc) Attack Pattern OS Credential Dumping - T1003 (0a3ead4e-6d47-4ccb-854c-a6a4f9d96b22) Attack Pattern 2
Event Triggered Execution - T1546 (b6301b64-ef57-4cce-bb0b-77026f14a8db) Attack Pattern Netsh Helper DLL - T1546.007 (f63fe421-b1d1-45c0-b8a7-02cd16ff2bed) Attack Pattern 2
Impair Defenses - T1562 (3d333250-30e4-4a82-9edc-756c68afc529) Attack Pattern Disable or Modify Tools - T1562.001 (ac08589e-ee59-4935-8667-d845e38fe579) Attack Pattern 2
OS Credential Dumping - T1003 (0a3ead4e-6d47-4ccb-854c-a6a4f9d96b22) Attack Pattern LSASS Memory - T1003.001 (65f2d882-3f41-4d48-8a06-29af77ec9f90) Attack Pattern 2
OS Credential Dumping - T1003 (0a3ead4e-6d47-4ccb-854c-a6a4f9d96b22) Attack Pattern Security Account Manager - T1003.002 (1644e709-12d2-41e5-a60f-3470991f5011) Attack Pattern 2
Scheduled Task - T1053.005 (005a06c6-14bf-4118-afa0-ebcd8aebb0c9) Attack Pattern Scheduled Task/Job - T1053 (35dd844a-b219-4e2b-a6bb-efa9a75995a9) Attack Pattern 2
Transport Agent - T1505.002 (35187df2-31ed-43b6-a1f5-2f1d3d58d3f1) Attack Pattern Server Software Component - T1505 (d456de47-a16f-4e46-8980-e67478a12dcb) Attack Pattern 2
Web Shell - T1505.003 (5d0d3609-d06d-49e1-b9c9-b544e0c618cb) Attack Pattern Server Software Component - T1505 (d456de47-a16f-4e46-8980-e67478a12dcb) Attack Pattern 2