Skip to main content

Payload

IDDescriptionSignificance / Prevalence
BH12331Executes code directly from the Internet.
BH12381Injects a DLL to a DNS server.
BH12382Injects CSS into a page.
BH12383Injects JavaScript code into a page.
BH12386Installs or removes Windows Store apps.
BH12407Loads additional snap-ins or modules to the current session.
BH12408Loads additional snippets in Integrated Scripting Environment (ISE).
BH13294Contains SigLoader tool functionality, which is used for decrypting and loading shellcode.
BH13544Might compile and link WebGL programs.
BH13597Reads document properties.
BH15217Contains Base64-encoded data.
BH20113Uses a Nishang command to create a Compiled HTML Help file (.CHM) that could be used to run PowerShell commands and scripts.
BH20114Uses a Nishang command to create a JavaScript file, that could be used to run PowerShell commands and scripts.
BH20115Uses a Nishang command to create a shortcut capable of launching PowerShell commands and scripts.
BH20116Uses a Nishang command to create a Web Query (.iqy) file that can be used for phishing attacks.
BH20117Uses a Nishang command to create malicious SCT files that could be used to run PowerShell commands and scripts.
BH20118Uses a Nishang command to create SCF files that could be used to capture NTLM hashes.
BH20141Uses a Nishang command to generate a malicious HTML Application.
BH20142Uses a Nishang command to generate and modify existing Excel files with an auto-executable macro or DDE.
BH20143Uses a Nishang command to generate and modify existing Word files with an auto-executable macro or DDE.
BH20144Uses a Nishang command to generate DNS TXT records that could be used with other scripts.
BH20145Uses a Nishang command to generate JAR files to be used for Java Applet attacks.
BH20146Uses a Nishang command to generate rundll32.exe one-line commands that run PowerShell commands.
BH20231Uses PowerSploit/Empire command to install a security support provider (SSP) DLL.
BH20235Uses PowerSploit/Empire command to load Mimikatz tool in memory.
BH20245Uses PowerSploit/Empire command to patch in the path to a specified .bat (containing the specified command) into a pre-compiled hijackable C++ DLL and write the DLL out to the specified ServicePath location.
BH20255Uses PowerSploit/Empire command to replace the service binary for the specified service with one that executes a specified command as SYSTEM.
BH20319Uses PowerSploit/Empire command to write out a precompiled MSI installer that prompts for a user/group addition.