Rootkit
Adversaries may use rootkits to hide the presence of programs, files, network connections, services, drivers, and other system components. Rootkits are programs that hide the existence of malware by intercepting/hooking and modifying operating system API calls that supply system information. (Citation: Symantec Windows Rootkits) Rootkits or rootkit enabling functionality may reside at the user or kernel level in the operating system or lower, to include a hypervisor or [System Firmware](https:...
BY SOURCE
PROCEDURES (20)
Auto-extracted: 5 detections for kernel
Auto-extracted: 3 detections for driver
Auto-extracted: 2 detections for privilege
Auto-extracted: 2 detections for process creation monitoring
Auto-extracted: 2 detections for evasion
Auto-extracted: 1 detections for evasion
Auto-extracted: 1 detections for tamper
Auto-extracted: 1 detections for tamper
Auto-extracted: 1 detections for unusual
Auto-extracted: 1 detections for suspicious
Auto-extracted: 1 detections for kernel
Auto-extracted: 1 detections for persist
Auto-extracted: 1 detections for masquerad
Auto-extracted: 1 detections for persist
Auto-extracted: 1 detections for parent process
Auto-extracted: 1 detections for unusual
Auto-extracted: 1 detections for general monitoring
Auto-extracted: 1 detections for parent process
Auto-extracted: 1 detections for masquerad
Auto-extracted: 1 detections for kernel monitoring