Common Information
Type | Value |
---|---|
Value |
c:\windows\system32\calc.exe |
Category | |
Type | File |
Misp Type | |
Description |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-10-24 | 40 | ValleyRAT Insights: Tactics, Techniques, and Detection Methods | Splunk | ||
Details | Website | 2024-09-25 | 9 | Capturing NTLM hashes using a USB | ||
Details | 2023-08-10 | 33 | MoustachedBouncer | |||
Details | Website | 2023-06-15 | 13 | One Electron to Rule Them All | ||
Details | 2022-09-22 | 64 | Report on APT Attacks by BlackTech | |||
Details | Website | 2022-08-31 | 156 | Ryuk Ransomware: History, Timeline, and Adversary Simulation - FourCore | ||
Details | Website | 2022-08-18 | 181 | APT41 World Tour 2021 on a tight schedule | ||
Details | 2022-04-26 | 63 | BlackTech 標的型攻撃解析レポート | |||
Details | Website | 2022-04-12 | 24 | Tarrask malware uses scheduled tasks for defense evasion - Microsoft Security Blog | ||
Details | Website | 2022-02-14 | 35 | Dropping Files on a Domain Controller Using CVE-2021-43893 | Rapid7 Blog | ||
Details | Website | 2021-06-17 | 4 | Bypassing Image Load Kernel Callbacks - MDSec | ||
Details | Website | 2020-07-07 | 7 | Configuring a Windows Domain to Dynamically Analyze an Obfuscated Lateral Movement Tool | Mandiant | ||
Details | Website | 2020-06-17 | 13 | Varonis Exposes Global Cyber Campaign: C2 Server Actively Compromising Thousands of Victims | ||
Details | Website | 2020-06-10 | 22 | Cmd Hijack - a command/argument confusion with path traversal in cmd.exe | ||
Details | Website | 2019-03-15 | 9 | In BSidesSF CTF, calc.exe exploits you! (Author writeup of launchcode) | ||
Details | 2018-06-18 | 3019 | MacProStorage02:_2018ROW:Bitdefender-Whitepaper-RADrat-crea2645-A4-en_EN:Bitdefender-Whitepaper-RADrat-crea2645-A4-en_EN.indd | |||
Details | Website | 2018-06-12 | 20 | Pentester’S Windows NTFS Tricks Collection | ||
Details | Website | 2017-11-15 | 31 | WinAppDbg - Part 3 - Manipulating Function Calls | ||
Details | Website | 2017-08-19 | 5 | UACMe - Defeat Windows User Account Control (UAC) - Darknet - Hacking Tools, Hacker News & Cyber Security | ||
Details | Website | 2017-08-14 | 16 | Are you looking out for forfiles.exe (if you are watching for cmd.exe) | ||
Details | Website | 2016-04-18 | 11 | Presenting PeNet: a native .NET library for analyzing PE Headers with PowerShell | ||
Details | Website | 2016-03-16 | 174 | Jump List Forensics: AppID Master List (400+ AppIDs) | ||
Details | Website | 2015-11-14 | 24 | Intro to .NET Remoting for Hackers | ||
Details | Website | 2012-08-23 | 67 | Hexacorn | Blog Finding Smoking Gun and going beyond that – Helpful Forensic Artifacts |