Hidden Window
Adversaries may use hidden windows to conceal malicious activity from the plain sight of users. In some cases, windows that would typically be displayed when an application carries out an operation can be hidden. This may be utilized by system administrators to avoid disrupting user work environments when carrying out administrative tasks. Adversaries may abuse these functionalities to hide otherwise visible windows from users so as not to alert the user to adversary activity on the system.(Ci...
BY SOURCE
PROCEDURES (6)
Auto-extracted: 5 detections for process creation monitoring
Auto-extracted: 2 detections for suspicious
Auto-extracted: 1 detections for exfiltrat
Auto-extracted: 1 detections for api
Auto-extracted: 1 detections for script execution monitoring
Auto-extracted: 1 detections for exfiltrat