Replies: 2 comments
-
|
Hello @kmkw926 ! |
Beta Was this translation helpful? Give feedback.
0 replies
-
|
I tried again after changing FOLLOW_SHELLCODES option to 3, and I got the result that I want ! |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Hello.
Some malware deploys shellcode on private memory and executes it in a "new thread" by calling CreateThread or NtCreateThreadEx.
I'm wondering it's possible that current implementation of TinyTracer can track a shellcode executed by new thread.
When I analysed a malware that uses this technich, it seemed not to track by TinyTracer as no API call log was shown in tag file.
And also, I checked repository wiki and tiny tracer ini file, but I couldn't find any relative options.
I think it will become more useful by this.
thank you.
Beta Was this translation helpful? Give feedback.
All reactions