heroui logo

Remote Thread Creation Ttdinject.exe Proxy

Sigma Rules

View Source
Summary
This detection rule identifies the creation of a remote thread using Ttdinject.exe, which is commonly used as a proxy for various malicious activities. The rule focuses on monitoring instances where Ttdinject.exe is involved in thread creation, a technique often leveraged by attackers to execute code in the context of another process, thereby evading detection mechanisms. By examining the properties of the process creation events originating from Ttdinject.exe, analysts can determine potential suspicious behavior linked to this executable. This rule stands out due to its specificity in targeting an executable known for aiding in defense evasion strategies, as documented in the LOLBAS (Living Off The Land Binaries and Scripts) project.
Categories
  • Windows
Data Sources
  • Process
Created: 2022-05-16