CMSTP (T1218.003)

View on ATT&CK

In Playbook

Associated Tactics

  • Defense Evasion

Defense Evasion (TA0005)

The adversary is trying to avoid being detected. Defense Evasion consists of techniques that adversaries use to avoid detection throughout their compromise. Techniques used for defense evasion include uninstalling/disabling security software or obfuscating/encrypting data and scripts. Adversaries also leverage and abuse trusted processes to hide and masquerade their malware. Other tactics’ techniques are cross-listed here when those techniques include the added benefit of subverting defenses.

View on ATT&CK

Procedure Examples

Description Source(s)
Carr, N. (2018, January 31). Here is some early bad cmstp.exe... Retrieved September 12, 2024. Twitter CMSTP Usage Jan 2018
Microsoft. (2009, October 8). How Connection Manager Works. Retrieved April 11, 2018. Microsoft Connection Manager Oct 2009
Moe, O. (2017, August 15). Research on CMSTP.exe. Retrieved April 11, 2018. MSitPros CMSTP Aug 2017
Moe, O. (2018, March 1). Ultimate AppLocker Bypass List. Retrieved April 10, 2018. GitHub Ultimate AppLocker Bypass List
Seetharaman, N. (2018, July 7). Detecting CMSTP-Enabled Code Execution and UAC Bypass With Sysmon.. Retrieved August 6, 2018. Endurant CMSTP July 2018
Tyrer, N. (2018, January 30). CMSTP.exe - remote .sct execution applocker bypass. Retrieved September 12, 2024. Twitter CMSTP Jan 2018