System Binary Proxy Execution
Overview System Binary Proxy Execution leverages legitimate Windows binaries (e.g., rundll32.exe, mshta.exe) to execute malicious code. These binaries are trusted by the OS, allowing attackers to bypass security controls like antivirus and application whitelisting by using these tools to proxy malicious actions. Historical Context This technique gained prominence as security defenses improved. Traditional malware detection…
