![]() ![]() "iexplore.exe" wrote 32 bytes to a remote process "C:\Program Files (x86)\Internet Explorer\iexplore.exe" (Handle: 1184) "iexplore.exe" wrote 4 bytes to a remote process "C:\Program Files (x86)\Internet Explorer\iexplore.exe" (Handle: 868) "iexplore.exe" wrote 8 bytes to a remote process "C:\Program Files (x86)\Internet Explorer\iexplore.exe" (Handle: 868) ![]() "iexplore.exe" wrote 32 bytes to a remote process "C:\Program Files (x86)\Internet Explorer\iexplore.exe" (Handle: 868) "iexplore.exe" wrote 52 bytes to a remote process "C:\Program Files (x86)\Internet Explorer\iexplore.exe" (Handle: 868) "EXCEL.EXE" wrote 8 bytes to a remote process "C:\Program Files\Internet Explorer\iexplore.exe" (Handle: 2176) "EXCEL.EXE" wrote 52 bytes to a remote process "C:\Program Files\Internet Explorer\iexplore.exe" (Handle: 2176) "EXCEL.EXE" wrote 32 bytes to a remote process "%PROGRAMFILES%\Internet Explorer\iexplore.exe" (Handle: 2176) Reads the registry for installed applicationsĪn adversary may attempt to get detailed information about the operating system and hardware, including version, patches, hotfixes, service packs, and architecture.Ĭontains ability to read software policiesĪdversaries may attempt to get a listing of open application windows.Īdversaries may stage collected data in a central location or directory on the local system prior to Exfiltration.Ĭreates a writable file in a temporary directoryĪdversaries may employ a known encryption algorithm to conceal command and control traffic rather than relying on any inherent protections provided by a communication protocol. Reads information about supported languages Queries the display settings of system associated file extensions ![]() Queries the internet cache settings (often used to hide footprints in index.dat or internet cache)Ĭhecks warning level of secure to non-secure traffic redirection Installs hooks/patches the running processĪdversaries may interact with the Windows Registry to gather information about the system, configuration, and installed software. Scans for the windows taskbar (may be used for explorer injection)Īdversaries may use Obfuscated Files or Information to hide artifacts of an intrusion from analysis.Ĭontains escaped byte string (often part of obfuscated shellcode)Īdversaries may interact with the Windows Registry to hide configuration information within Registry keys, remove information as part of cleaning up, or as part of other techniques to aid in persistence and execution.Īdversaries may hook into Windows application programming interface (API) functions to collect user credentials. Adversaries may inject code into processes in order to evade process-based defenses as well as possibly elevate privileges.Īdversaries may inject malicious code into process via Extra Window Memory (EWM) in order to evade process-based defenses as well as possibly elevate privileges.įound a string that may be used as part of an injection method ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |