-
Notifications
You must be signed in to change notification settings - Fork 41
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
10.B) Registry Run Keys / Startup Folder #25
Comments
10.B.1 Registry Run Keys / Startup FolderProcedure: Executed LNK payload (hostui.lnk) in Startup Folder on user login |
10.B.2 Execution through APIProcedure: Executed PowerShell payload via the CreateProcessWithToken API No Evidence showing that specific API. However, we can see a few events around the secondary logon service
Results
|
10.B.3 Access Token ManipulationProcedure: Manipulated the token of the PowerShell payload via the CreateProcessWithToken API |
Description
The payload in the Startup folder executes a follow-on payload using a stolen token (T1106, T1134).
The text was updated successfully, but these errors were encountered: