Vendor
medium
advisory
Suspicious Child Processes from Communication Applications
3 rules 3 TTPsThe detection rule identifies suspicious child processes spawned from communication applications on Windows systems, potentially indicating masquerading or exploitation of vulnerabilities within these applications.
Elastic Defend +12
defense-evasion
persistence
windows
3r
3t
medium
advisory
Masquerading Business Application Installers
2 rules 4 TTPsAttackers masquerade malicious executables as legitimate business application installers to trick users into downloading and executing malware, leveraging defense evasion and initial access techniques.
Elastic Defend +22
masquerading
defense-evasion
initial-access
malware
windows
2r
4t