Twisted_sister-1.7z
: Record any modifications to the Windows Registry for persistence (e.g., Run keys) or files created/deleted. 5. Indicators of Compromise (IoCs)
: List file paths, mutexes, and registry keys created during infection. 6. Recommendations & Mitigation Twisted_Sister-1.7z
: Firewall rules to block C2 IPs or EDR (Endpoint Detection and Response) signatures to detect the sample. : Record any modifications to the Windows Registry
: Document which processes are spawned (e.g., cmd.exe calling powershell.exe ). cmd.exe calling powershell.exe ).