EXPLORE
← Back to Explore
T1127

Trusted Developer Utilities Proxy Execution

Adversaries may take advantage of trusted developer utilities to proxy execution of malicious payloads. There are many utilities used for software development related tasks that can be used to execute code in various forms to assist in development, debugging, and reverse engineering.(Citation: engima0x3 DNX Bypass)(Citation: engima0x3 RCSI Bypass)(Citation: Exploit Monday WinDbg)(Citation: LOLBAS Tracker) These utilities may often be signed with legitimate certificates that allow them to execute...

Windows
38
Detections
3
Sources
0
Threat Actors

BY SOURCE

19sigma16elastic3splunk_escu

PROCEDURES (23)

Process Creation Monitoring7 detections

Auto-extracted: 7 detections for process creation monitoring

Network Connection Monitoring4 detections

Auto-extracted: 4 detections for network connection monitoring

Script Block2 detections

Auto-extracted: 2 detections for script block

Privilege2 detections

Auto-extracted: 2 detections for privilege

Script Execution Monitoring2 detections

Auto-extracted: 2 detections for script execution monitoring

Bypass2 detections

Auto-extracted: 2 detections for bypass

Unusual2 detections

Auto-extracted: 2 detections for unusual

Child Process2 detections

Auto-extracted: 2 detections for child process

Remote1 detections

Auto-extracted: 1 detections for remote

Unusual1 detections

Auto-extracted: 1 detections for unusual

General Monitoring1 detections

Auto-extracted: 1 detections for general monitoring

Persist1 detections

Auto-extracted: 1 detections for persist

Module Load Monitoring1 detections

Auto-extracted: 1 detections for module load monitoring

Inject1 detections

Auto-extracted: 1 detections for inject

Suspicious1 detections

Auto-extracted: 1 detections for suspicious

Privilege1 detections

Auto-extracted: 1 detections for privilege

Inject1 detections

Auto-extracted: 1 detections for inject

Suspicious1 detections

Auto-extracted: 1 detections for suspicious

Unusual1 detections

Auto-extracted: 1 detections for unusual

Powershell1 detections

Auto-extracted: 1 detections for powershell

Persist1 detections

Auto-extracted: 1 detections for persist

Persist1 detections

Auto-extracted: 1 detections for persist

Powershell1 detections

Auto-extracted: 1 detections for powershell

DETECTIONS (38)

Anomalous Linux Compiler Activity
elasticlow
AspNetCompiler Execution
sigmamedium
C# IL Code Compilation Via Ilasm.EXE
sigmamedium
Delayed Execution via Ping
elasticlow
Detection of PowerShell Execution via Sqlps.exe
sigmamedium
ETW Registry Disabled
splunk_escu
Execution of Persistent Suspicious Program
elasticmedium
JScript Compiler Execution
sigmalow
Kavremover Dropped Binary LOLBIN Usage
sigmahigh
Microsoft Build Engine Started an Unusual Process
elasticlow
Microsoft Build Engine Started by a Script Process
elasticmedium
Microsoft Build Engine Started by a System Process
elasticmedium
Microsoft Build Engine Started by an Office Application
elastichigh
Microsoft Build Engine Using an Alternate Name
elasticlow
MsBuild Making Network Connections
elasticmedium
Network Activity to a Suspicious Top Level Domain
elastichigh
Node Process Executions
sigmamedium
Potential Arbitrary Code Execution Via Node.EXE
sigmahigh
Potential Binary Proxy Execution Via Cdb.EXE
sigmamedium
Potential Credential Access via Trusted Developer Utility
elastichigh
Potential Mftrace.EXE Abuse
sigmamedium
Potentially Suspicious ASP.NET Compilation Via AspNetCompiler
sigmahigh
Process Injection by the Microsoft Build Engine
elasticlow
Remote Thread Creation Ttdinject.exe Proxy
sigmahigh
SQL Client Tools PowerShell Session Detection
sigmamedium
Suspicious .NET Code Compilation
elasticmedium
Suspicious Child Process of AspNetCompiler
sigmahigh
Suspicious Execution from a Mounted Device
elasticmedium
Suspicious File Created by ArcSOC.exe
sigmahigh
Suspicious microsoft workflow compiler rename
splunk_escu
Suspicious microsoft workflow compiler usage
splunk_escu
Suspicious Use of CSharp Interactive Console
sigmahigh
Unusual Network Activity from a Windows System Binary
elasticmedium
Unusual Process Network Connection
elasticlow
Use of Remote.exe
sigmamedium
Use of TTDInject.exe
sigmamedium
Use of VSIISExeLauncher.exe
sigmamedium
Use of Wfc.exe
sigmamedium