Use of TTDInject.exe
Detects the executiob of TTDInject.exe, which is used by Windows 10 v1809 and newer to debug time travel (underlying call of tttracer.exe)
Sigma rule (View on GitHub)
 1title: Use of TTDInject.exe
 2id: b27077d6-23e6-45d2-81a0-e2b356eea5fd
 3status: test
 4description: Detects the executiob of TTDInject.exe, which is used by Windows 10 v1809 and newer to debug time travel (underlying call of tttracer.exe)
 5references:
 6    - https://lolbas-project.github.io/lolbas/Binaries/Ttdinject/
 7author: frack113
 8date: 2022-05-16
 9tags:
10    - attack.defense-evasion
11    - attack.t1127
12logsource:
13    product: windows
14    category: process_creation
15detection:
16    selection:
17        - Image|endswith: 'ttdinject.exe'
18        - OriginalFileName: 'TTDInject.EXE'
19    condition: selection
20falsepositives:
21    - Legitimate use
22level: medium
References
Related rules
- C# IL Code Compilation Via Ilasm.EXE
- Detection of PowerShell Execution via Sqlps.exe
- JScript Compiler Execution
- Kavremover Dropped Binary LOLBIN Usage
- Potential Arbitrary Code Execution Via Node.EXE
