LOLBAS/yml/OSBinaries/Ttdinject.yml

31 lines
1.1 KiB
YAML
Raw Normal View History

2020-05-12 22:24:49 +02:00
---
Name: ttdinject.exe
Description: Used by Windows 1809 and newer to Debug Time Travel (Underlying call of tttracer.exe)
Author: 'Maxime Nadeau'
Created: '2020-05-12'
Commands:
- Command: ttdinject.exe /ClientScenario TTDRecorder /ddload 0 /ClientParams "7 tmp.run 0 0 0 0 0 0 0 0 0 0" /launch "C:/Windows/System32/calc.exe"
Description: Execute calc using ttdinject.exe. Requires administrator privileges. A log file will be created in tmp.run. The log file can be changed, but the length (7) has to be updated.
Usecase: Spawn process using other binary
Category: Execute
Privileges: Administrator
MitreID: T1218
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
OperatingSystem: Windows 10 1809 and newer
Full_Path:
- Path: C:\Windows\System32\ttdinject.exe
- Path: C:\Windows\Syswow64\ttdinject.exe
Code_Sample:
- Code:
Detection:
- IOC: Event ID 10
- IOC: binary.exe spawned
Resources:
- Link: https://twitter.com/Oddvarmoe/status/1196333160470138880
Acknowledgement:
- Person: Oddvar Moe
Handle: @oddvarmoe
- Person: Maxime Nadeau
Handle: @m_nad0
---