Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update T1564.003.yaml #2884

Merged
merged 5 commits into from
Aug 3, 2024
Merged

Update T1564.003.yaml #2884

merged 5 commits into from
Aug 3, 2024

Conversation

msdlearn
Copy link
Contributor

Details:
Launch conhost.exe in "headless" mode, it means that no visible window will pop up on the victim's machine. This could be a sign of "conhost" usage as a LOLBIN or potential process injection activity.conhost.exe can be used as proxy the execution of arbitrary commands

Testing:
Tested successfully in atomic runner

Copy link
Collaborator

@clr2of8 clr2of8 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

👍

@clr2of8 clr2of8 merged commit f85294b into redcanaryco:master Aug 3, 2024
2 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants