Add 4 new DLLs actively used ITW with search order hijacking #72
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
New entries.
Cisco: wcldll.dll seen loaded into ptInst.exe. The exact vulnerable path where this resides was pieced together from multiple sources and is technically unknown. This has been seen maliciously residing in the directory appdata\roaming\microsoft\windows\Roaming\mibincodec\ptInst.exe
Asus: asus_wmi.dll and asio.dll both have been seen loaded into renamed executables of atkexComSvc.exe such as TPAutoConnect.exe. This has been seen maliciously residing within subdirectories of AppData\Local\
Glorylogic: badata_x64.dll seen loaded into TrueBurner.exe. This has been seen maliciously residing in subdirectories of ProgramData\