title: Time Travel Debugging Utility Usage author: "Ensar \u015Eamil, @sblmsrsn, @oscd_initiative" date: 2020/10/06 description: Detects usage of Time Travel Debugging Utility. Adversaries can execute malicious processes and dump processes, such as lsass.exe, via tttracer.exe. detection: SELECTION_1: EventID: 1 SELECTION_2: ParentImage: '*\tttracer.exe' condition: (SELECTION_1 and SELECTION_2) falsepositives: - Legitimate usage by software developers/testers id: 0b4ae027-2a2d-4b93-8c7e-962caaba5b2a level: high logsource: category: process_creation product: windows modified: 2021/09/21 references: - https://lolbas-project.github.io/lolbas/Binaries/Tttracer/ - https://twitter.com/mattifestation/status/1196390321783025666 - https://twitter.com/oulusoyum/status/1191329746069655553 related: - id: e76c8240-d68f-4773-8880-5c6f63595aaf type: derived status: experimental tags: - attack.defense_evasion - attack.credential_access - attack.t1218 - attack.t1003.001 yml_filename: process_creation_tttracer_mod_load.yml yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/image_load