Proxy Execution Via Explorer.exe (9eb271b9-24ae-4cd4-9465-19cfc1047f3e)
Attackers can use explorer.exe for evading defense mechanisms
Cluster A | Galaxy A | Cluster B | Galaxy B | Level |
---|---|---|---|---|
Proxy Execution Via Explorer.exe (9eb271b9-24ae-4cd4-9465-19cfc1047f3e) | Sigma-Rules | System Binary Proxy Execution - T1218 (457c7820-d331-465a-915e-42f85500ccc4) | Attack Pattern | 1 |