Time Travel Debugging Utility Usage - Image
Detects usage of Time Travel Debugging Utility. Adversaries can execute malicious processes and dump processes, such as lsass.exe, via tttracer.exe.
Sigma rule (View on GitHub)
1title: Time Travel Debugging Utility Usage - Image
2id: e76c8240-d68f-4773-8880-5c6f63595aaf
3status: test
4description: Detects usage of Time Travel Debugging Utility. Adversaries can execute malicious processes and dump processes, such as lsass.exe, via tttracer.exe.
5references:
6 - https://lolbas-project.github.io/lolbas/Binaries/Tttracer/
7 - https://twitter.com/mattifestation/status/1196390321783025666
8 - https://twitter.com/oulusoyum/status/1191329746069655553
9author: 'Ensar Şamil, @sblmsrsn, @oscd_initiative'
10date: 2020-10-06
11modified: 2022-12-02
12tags:
13 - attack.defense-evasion
14 - attack.credential-access
15 - attack.t1218
16 - attack.t1003.001
17logsource:
18 product: windows
19 category: image_load
20detection:
21 selection:
22 ImageLoaded|endswith:
23 - '\ttdrecord.dll'
24 - '\ttdwriter.dll'
25 - '\ttdloader.dll'
26 condition: selection
27falsepositives:
28 - Legitimate usage by software developers/testers
29level: high
References
Related rules
- Time Travel Debugging Utility Usage
- NotPetya Ransomware Activity
- Potential LSASS Process Dump Via Procdump
- Process Access via TrolleyExpress Exclusion
- Process Memory Dump Via Comsvcs.DLL