Bạn đang xem: Vcagent
This trang web uses cookies khổng lồ enhance your browsing experience. Please cảnh báo that by continuing lớn use this site you consent lớn the terms of our Data Protection Policy.
ACCEPTXem thêm: Cồn Kế Cách Sử Dụng Và Mua Cồn Kế Ở Đâu Chất Lượng, Nơi Bán Cồn Kế Giá Rẻ, Uy Tín, Chất Lượng Nhất
This report is generated from a file or URL submitted lớn this webservice on February 19th 2020 22:16:56 (UTC) and action script Heavy Anti-EvasionGuest System: Windows 7 64 bit, Professional, 6.1 (build 7601), Service Pack 1 Report generated by Falcon Sandbox v8.30 © Hybrid Analysis
T1047 | Windows Management Instrumentation | Execution | Windows Management Instrumentation (WMI) is a Windows administration feature that provides a uniform environment for local & remote access lớn Windows system components. Learn more | T1168 | Local Job Scheduling | Execution Persistence | On Linux and Apple systems, multiple methods are supported for creating pre-scheduled & periodic background jobs: cron,Die. Learn more | 2 confidential indicators | T1035 | Service Execution | Execution | Adversaries may execute a binary, command, or script via a method that interacts with Windows services, such as the Service Control Manager. Learn more | 2 confidential indicators | Persistence | |||||||||||||||||||||||||||
T1215 | Kernel Modules and Extensions | Persistence | Loadable Kernel Modules (or LKMs) are pieces of code that can be loaded và unloaded into the kernel upon demand. Learn more | T1179 | Hooking | Credential Access Persistence Privilege Escalation | Windows processes often leverage application programming interface (API) functions khổng lồ perform tasks that require reusable system resources. Learn more | T1168 | Local Job Scheduling | Execution Persistence | On Linux & Apple systems, multiple methods are supported for creating pre-scheduled and periodic background jobs: cron,Die. Learn more | 2 confidential indicators | Privilege Escalation | ||||||||||||||||||||||||||||
T1179 | Hooking | Credential Access Persistence Privilege Escalation | Windows processes often leverage application programming interface (API) functions to lớn perform tasks that require reusable system resources. Learn more | T1055 | Process Injection | Defense Evasion Privilege Escalation | Process injection is a method of executing arbitrary code in the address space of a separate live process. Learn more | 2 confidential indicators | Defense Evasion | ||||||||||||||||||||||||||||||||
T1116 | Code Signing | Defense Evasion | Code signing provides a cấp độ of authenticity on a binary from the developer & a guarantee that the binary has not been tampered with. Learn more | T1107 | File Deletion | Defense Evasion | Malware, tools, or other non-native files dropped or created on a system by an adversary may leave traces behind as to what was done within a network và how. Learn more | T1055 | Process Injection | Defense Evasion Privilege Escalation | Process injection is a method of executing arbitrary code in the address space of a separate live process. Learn more | 2 confidential indicators | T1112 | Modify Registry | Defense Evasion | Adversaries may interact with the Windows Registry to hide configuration information within Registry keys, remove information as part of cleaning up, or as part of other techniques lớn aid in < | T1045 | Software Packing | Defense Evasion | Software packing is a method of compressing or encrypting an executable. Learn more | Credential Access | ||||||||||||||||||||
T1179 | Hooking | Credential Access Persistence Privilege Escalation | Windows processes often leverage application programming interface (API) functions to lớn perform tasks that require reusable system resources. Learn more | Discovery | |||||||||||||||||||||||||||||||||||||
T1012 | Query Registry | Discovery | Adversaries may interact with the Windows Registry lớn gather information about the system, configuration, & installed software. Learn more | 2 confidential indicators | T1120 | Peripheral Device Discovery | Discovery | Adversaries may attempt to gather information about attached peripheral devices và components connected lớn a computer system. Learn more | T1082 | System Information Discovery | Discovery | An adversary may attempt lớn get detailed information about the operating system and hardware, including version, patches, hotfixes, service packs, và architecture. Learn more | T1010 | Application Window Discovery | Discovery | Adversaries may attempt lớn get a listing of xuất hiện application windows. Learn more | T1124 | System Time Discovery | Discovery | The system time is set & stored by the Windows Time Service within a tên miền to maintain time synchronization between systems & services in an enterprise network. Learn more | T1057 | Process Discovery | Discovery | Adversaries may attempt to lớn get information about running processes on a system. Learn more | 1 confidential indicators | Lateral Movement | |||||||||||||||
T1076 | Remote Desktop Protocol | Lateral Movement | Remote desktop is a common feature in operating systems. Learn more | Collection | |||||||||||||||||||||||||||||||||||||
T1114 | Email Collection | Collection | Adversaries may target user thư điện tử to collect sensitive information from a target. Learn more | 1 confidential indicators | Command và Control | ||||||||||||||||||||||||||||||||||||
T1094 | Custom Command & Control Protocol | Command và Control | Adversaries may communicate using a custom command and control protocol instead of using existing < |