Skip Navigation

Collection

These indicators represent situations where the file has elements that indicate capabilities or evidence of collecting data. This can include the enumeration of system configuration or the collection of specific sensitive information.
Indicator
Description
BrowserInfoTheft
The file contains evidence of an intent to read passwords stored in browser caches. Malware uses this to collect the passwords for exfiltration.
CredentialProvider
The file contains evidence of interaction with a credential provider, or the desire to appear as one. Malware does this because credential providers get access to many types of sensitive data, such as usernames and passwords, and by acting as one, they may be able to subvert the authentication integrity.
CurrentUserInfoImports
The file imports functions that are used to gather information about the currently logged-in user. Malware uses this to determine paths of action to escalate privileges and to better tailor attacks.
DebugStringImports
The file imports functions that are used to output debug strings. Typically, this is disabled in production software, but left on in malware that is being tested.
DiskInfoImports
The file imports functions that can be used to gather details about volumes on the system. Malware uses this in conjunction with listing to determine facts about the volumes in preparation for a further attack.
EnumerateFileImports
The file imports functions that are used to list files. Malware uses this to look for sensitive data or to find further points of attack.
EnumerateModuleImports
The file imports functions that can be used to list all of the DLLs that a running process uses. Malware uses this capability to locate and target specific libraries for loading into a process, and to map out a process it wishes to inject into.
EnumerateNetwork
The file demonstrates evidence of a capability to attempt to enumerate connected networks and network adapters. Malware does this to determine where a target system lies in relation to others, and to look for possible lateral paths.
EnumerateProcessImports
The file imports functions that can be used to list all of the running processes on a system. Malware uses this capability to locate processes to inject into or those that it wishes to delete.
EnumerateVolumeImports
The file imports functions that can be used to list the volumes on the system. Malware uses this to find all the areas that it might need to search for data, or to spread an infection.
GinaImports
The file imports functions that are used to access Gina. Malware does this to attempt to breach the secure ctrl-alt-delete password entry system or other network login functions.
HostnameSearchImports
The file imports functions that are used to gather information about host names on the network and the hostname of the machine itself. Malware uses this capability to better target further attacks or to scan for new targets.
KeystrokeLogImports
The file imports functions that can capture and log keystrokes from the keyboard. Malware uses this to capture and save keystrokes to find sensitive information such as passwords.
OSInfoImports
The file imports functions that are used to gather information about the current operating system. Malware uses this to determine how to better tailor further attacks and to report information back to a controller.
PossibleKeylogger
The file contains evidence of key-logger type activity. Malware uses key loggers to collect sensitive information from the keyboard.
PossiblePasswords
The file has evidence of including common passwords, or a structure that would enable brute forcing common passwords. Malware uses this to attempt to penetrate a network further by accessing other resources via password.
ProcessorInfoWMI
The file imports functions that can be used to determine details about the processor. Malware uses this to tailor attacks and to exfiltrate this data to common command-and-control infrastructure.
RDPUsage
The file shows evidence of interacting with the Remote Desktop Protocol (RDP). Malware frequently uses this to move laterally and to offer direct command-and-control functionality.
SpyString
The file is possibly spying on the clipboard or user actions via accessibility API usage.
SystemDirImports
The file imports functions used to locate the system directory. Malware does this to find where many of the installed system binaries are located, as it frequently hides among them.
UserEnvInfoImports
The file imports functions that are used to gather information about the environment of the current logged-in user. Malware uses this to determine details about the logged-in user and to look for other intelligence that can be gleaned from the environment variables.