
Installs hooks/patches the running processĪdversaries may conduct C2 communications over a non-standard port to bypass proxies and firewalls that have been improperly configured.įound malicious artifacts related to "67.227.226.241".
#Logoist maltese cross outline windows#
Windows processes often leverage application programming interface (API) functions to perform tasks that require reusable system resources.

Adversaries may execute a binary, command, or script via a method that interacts with Windows services, such as the Service Control Manager.
