Question: You will use the MITRE ATT&CK framework located at Mitre Att&Ck to answer this question. Adversaries may abuse technology such as Compiled HTML files (
You will use the MITRE ATT&CK framework located at Mitre Att&Ck to answer this question.
Adversaries may abuse technology such as Compiled HTML files chm to conceal malicious code. A custom CHM file containing embedded payloads could be delivered to a victim as an email attachment and the then triggered by User Execution. CHM execution may also bypass application whitelisting on older andor unpatched systems that do not account for execution of binaries through hhexe. From the list, select all those methods you could use to detect this behavior.
Question options:
Monitor for execution of AppleScript through osascript that may be related to other suspicious behavior occurring on the system
Monitor and analyze the execution and arguments of hhexe
Monitor presence and use of CHM files, especially if they are not typically used within an environment
Compare recent invocations of hhexe with prior history of known good arguments to determine anomalous and potentially adversarial activity ex: obfuscated andor malicious commands
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
