Testing yourself
In this section we are going to repeat the exercise as I did before, but you are going to fill it all by yourself. First we are going to use paragraph with the behavior you should identify highlighted by me. Then, we are going to repeat the exercise without the guided help.
To complete this exercise, you will need access to the ATT&CK™ website: https://attack.mitre.org/beta/
Tip
Look for keywords in the text like persistence, execute, gather, send, etc., that could help you identify the type of behaviour the author is talking about! You can also use the ATT&CK™ web search box to find other keywords like DLL, Windows API, registry key, etc.
Help yourself with the ATT&CK™ Matrix to better identify the corresponding tactics, techniques and subtechniques.
A formgrabber injects a DLL (Dynamic Link Library) into a browser and monitors for calls to the HttpSendRequest API within WININET.DLL in order to intercept the data before encryption...