ImageFileExecutionOptions - if you're an incident responder you should make yourself familiar with this key. Offers multiple opportunities for malware persistence, including Application Verifiers described here.http://cybellum.com/doubleagentzero-day-code-injection-and-persistence-technique/ …
-
-
Replying to @MalwareJake
Thanks for sharing! I shared an IOC about the "Debugger Persistence method" almost 6 years ago. This is another one of the "multiple opportunities". http://web.archive.org/web/20121128083353/http://ioc.forensicartifacts.com/2012/05/debugger-persistence-mechanism/ … (thanks to http://archive.org for eternal caching) /cc
@iocbucket@Digital4rensicspic.twitter.com/4Ex0GsVmuE
1 reply 0 retweets 1 like
Replying to @c_APT_ure @MalwareJake and
I remember using this same technique ages ago to stop malware processes from running :D Some techniques definitely work both ways.
2:16 PM - 15 Jan 2018
0 replies
0 retweets
1 like
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.