LOLBAS/yml/OSBinaries/Tttracer.yml

40 lines
1.4 KiB
YAML
Raw Normal View History

---
Name: Tttracer.exe
Description: Used by Windows 1809 and newer to Debug Time Travel
Author: 'Oddvar Moe'
Created: 2019-11-05
Commands:
2019-11-05 14:36:53 +01:00
- Command: tttracer.exe C:\windows\system32\calc.exe
Description: Execute calc using tttracer.exe. Requires administrator privileges
Usecase: Spawn process using other binary
Category: Execute
Privileges: Administrator
MitreID: T1218
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
OperatingSystem: Windows 10 1809 and newer
2019-11-18 12:50:49 +01:00
- Command: TTTracer.exe -dumpFull -attach pid
2019-11-18 12:47:51 +01:00
Description: Dumps process using tttracer.exe. Requires administrator privileges
Usecase: Dump process by PID
Category: Dump
Privileges: Administrator
MitreID: T1003
MitreLink: https://attack.mitre.org/wiki/Technique/T1003
OperatingSystem: Windows 10 1809 and newer
Full_Path:
- Path: C:\Windows\System32\tttracer.exe
- Path: C:\Windows\SysWOW64\tttracer.exe
Code_Sample:
2019-11-05 15:47:20 +01:00
- Code:
Detection:
2019-11-05 15:47:20 +01:00
- IOC: Parent child relationship. Tttracer parent for executed command
Resources:
- Link: https://twitter.com/oulusoyum/status/1191329746069655553
2019-11-18 12:47:51 +01:00
- Link: https://twitter.com/mattifestation/status/1196390321783025666
- Link: https://lists.samba.org/archive/cifs-protocol/2016-April/002877.html
Acknowledgement:
- Person: Onur Ulusoy
Handle: '@oulusoyum'
2019-11-18 12:47:51 +01:00
- Person: Matt Graeber
Handle: '@mattifestation'
2019-11-05 15:47:20 +01:00
---