COR_PROFILER (T1574.012)

View on ATT&CK

In Playbook

Associated Tactics

  • Persistence
  • Privilege Escalation
  • Defense Evasion

Persistence (TA0003)

The adversary is trying to maintain their foothold. Persistence consists of techniques that adversaries use to keep access to systems across restarts, changed credentials, and other interruptions that could cut off their access. Techniques used for persistence include any access, action, or configuration changes that let them maintain their foothold on systems, such as replacing or hijacking legitimate code or adding startup code.

View on ATT&CK

Procedure Examples

Description Source(s)
Microsoft. (2017, March 30). Profiling Overview. Retrieved June 24, 2020. Microsoft Profiling Mar 2017
Microsoft. (2013, February 4). Registry-Free Profiler Startup and Attach. Retrieved June 24, 2020. Microsoft COR_PROFILER Feb 2013
Lambert, T. (2020, May 7). Introducing Blue Mockingbird. Retrieved May 26, 2020. RedCanary Mockingbird May 2020
Brown, J. (2020, May 7). Detecting COR_PROFILER manipulation for persistence. Retrieved June 24, 2020. Red Canary COR_PROFILER May 2020
Almond. (2019, April 30). UAC bypass via elevated .NET applications. Retrieved June 24, 2020. Almond COR_PROFILER Apr 2019
Yair, O. (2019, August 19). Invisi-Shell. Retrieved June 24, 2020. GitHub OmerYa Invisi-Shell
Smith, C. (2017, May 18). Subvert CLR Process Listing With .NET Profilers. Retrieved June 24, 2020. subTee .NET Profilers May 2017