heroui logo

Use of TTDInject.exe

Sigma Rules

View Source
Summary
The detection rule aims to identify the execution of 'TTDInject.exe', a binary associated with Windows 10 versions 1809 and later. This executable is utilized primarily for debugging purposes during time travel analysis by invoking underlying calls to 'tttracer.exe'. Given its functionality, the execution of 'TTDInject.exe' could be benign in many scenarios; however, it may also be exploited by threat actors to evade detection or manipulate system performance under the guise of legitimate processes. The detection criteria include processes ending with 'ttdinject.exe' and those where the 'OriginalFileName' is 'TTDInject.EXE'. The rule helps pinpoint potentially malicious use of a tool that might otherwise blend in with legitimate system operations, representing a medium-level risk that should be further examined if triggered.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
  • Application Log
Created: 2022-05-16