![]() ![]() Tries to access unusual system drive letters Reads the registry for installed applicationsĪdversaries may enumerate files and directories or may search in specific locations of a host or network share for certain information within a file system. Reads information about supported languages Software packing is a method of compressing or encrypting an executable.Īdversaries may interact with the Windows Registry to gather information about the system, configuration, and installed software. Malware, tools, or other non-native files dropped or created on a system by an adversary may leave traces behind as to what was done within a network and how. Process injection is a method of executing arbitrary code in the address space of a separate live process. Installs hooks/patches the running process Windows processes often leverage application programming interface (API) functions to perform tasks that require reusable system resources. ![]() Opens the Kernel Security Device Driver (KsecDD) of Windows ![]() Loadable Kernel Modules (or LKMs) are pieces of code that can be loaded and unloaded into the kernel upon demand.
0 Comments
Leave a Reply. |