Answered step by step
Verified Expert Solution
Question
1 Approved Answer
You will use the MITRE ATT&CK framework located at Mitre Att&Ck to answer this question. Adversaries may abuse technology such as Compiled HTML files (
You will use the MITRE ATT&CK framework located at Mitre Att&Ck to answer this question.
Adversaries may abuse technology such as Compiled HTML files chm to conceal malicious code. A custom CHM file containing embedded payloads could be delivered to a victim as an email attachment and the then triggered by User Execution. CHM execution may also bypass application whitelisting on older andor unpatched systems that do not account for execution of binaries through hhexe. From the list, select all those methods you could use to detect this behavior.
Question options:
Monitor for execution of AppleScript through osascript that may be related to other suspicious behavior occurring on the system
Monitor and analyze the execution and arguments of hhexe
Monitor presence and use of CHM files, especially if they are not typically used within an environment
Compare recent invocations of hhexe with prior history of known good arguments to determine anomalous and potentially adversarial activity ex: obfuscated andor malicious commands
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started