Vendor
Persistence via Windows Installer (Msiexec)
3 rules 3 TTPsAdversaries may establish persistence by abusing the Windows Installer (msiexec.exe) to create scheduled tasks or modify registry run keys, allowing for malicious code execution upon system startup or user logon.
Suspicious Process Access via Direct System Call
2 rules 3 TTPsDetects suspicious process access events where the call trace does not originate from known Windows system DLLs, indicating potential defense evasion by bypassing hooked APIs via direct syscalls.
Startup or Run Key Registry Modification
3 rules 2 TTPsAttackers modify registry run keys or startup keys to achieve persistence by referencing a program that executes when a user logs in or the system boots.
Ingress Transfer via Windows BITS
2 rules 2 TTPsAdversaries may leverage Windows Background Intelligent Transfer Service (BITS) to download executable and archive files to evade defenses and establish command and control.
Suspicious Process Creation Followed by Memory Access from Unknown Region
2 rules 1 TTPThe rule identifies suspicious process creation where a process is created and immediately accessed from an unknown memory code region by the same parent process, indicating a potential code injection attempt, specifically process hollowing, commonly targeting processes spawned by Microsoft Office applications, scripting engines, and command-line tools for defense evasion.
Adobe RdrCEF.exe Hijack for Persistence
2 rules 2 TTPsAttackers can maintain persistence by replacing the legitimate RdrCEF.exe executable with a malicious one, which is executed every time Adobe Acrobat Reader is launched.