
References a system executable name in an unusual way in the commandlineĪdversaries may use NTFS file attributes to hide their malicious data in order to evade detection.Īdversaries may employ various means to detect and avoid virtualization and analysis environments. Adversaries may abuse the Windows service control manager to execute malicious commands or payloads.Īdversaries may abuse the Windows command shell for execution.Īdversaries may inject code into processes in order to evade process-based defenses as well as possibly elevate privileges.Īdversaries may inject malicious code into suspended and hollowed processes in order to evade process-based defenses.Īllocates virtual memory in a remote processĪdversaries may inject malicious code into process via Extra Window Memory (EWM) in order to evade process-based defenses as well as possibly elevate privileges.Īdversaries may match or approximate the name or location of legitimate files or resources when naming/placing them.
