Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

You will use the MITRE ATT&CK framework located at Mitre Att&Ck to answer this question. Adversaries may abuse technology such as Compiled HTML files (

You will use the MITRE ATT&CK framework located at Mitre Att&Ck to answer this question.
Adversaries may abuse technology such as Compiled HTML files (.chm) to conceal malicious code. A custom CHM file containing embedded payloads could be delivered to a victim as an email attachment and the then triggered by User Execution. CHM execution may also bypass application whitelisting on older and/or unpatched systems that do not account for execution of binaries through hh.exe. From the list, select all those methods you could use to detect this behavior.
Question 2 options:
Monitor for execution of AppleScript through osascript that may be related to other suspicious behavior occurring on the system
Monitor and analyze the execution and arguments of hh.exe
Monitor presence and use of CHM files, especially if they are not typically used within an environment
Compare recent invocations of hh.exe with prior history of known good arguments to determine anomalous and potentially adversarial activity (ex: obfuscated and/or malicious commands)

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Principles Programming And Performance

Authors: Patrick O'Neil

1st Edition

1558603921, 978-1558603929

More Books

Students also viewed these Databases questions

Question

Define and explain the nature of nonassociative learning.

Answered: 1 week ago

Question

Determine miller indices of plane X z 2/3 90% a/3

Answered: 1 week ago

Question

Use a three-step process to develop effective business messages.

Answered: 1 week ago