{"id":231730,"date":"2026-04-24T13:27:04","date_gmt":"2026-04-24T13:27:04","guid":{"rendered":"https:\/\/www.intrinsec.com\/?p=231730"},"modified":"2026-04-24T14:30:52","modified_gmt":"2026-04-24T14:30:52","slug":"redsun-practical-detection-artifacts","status":"publish","type":"post","link":"https:\/\/www.intrinsec.com\/en\/redsun-practical-detection-artifacts\/","title":{"rendered":"REDSUN &#8211; Practical Detection Artifacts Under Real-World Constraints"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"231730\" class=\"elementor elementor-231730\" data-elementor-settings=\"{&quot;element_pack_global_tooltip_width&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;element_pack_global_tooltip_width_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;element_pack_global_tooltip_width_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;element_pack_global_tooltip_padding&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;element_pack_global_tooltip_padding_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;element_pack_global_tooltip_padding_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;element_pack_global_tooltip_border_radius&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;element_pack_global_tooltip_border_radius_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true},&quot;element_pack_global_tooltip_border_radius_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;top&quot;:&quot;&quot;,&quot;right&quot;:&quot;&quot;,&quot;bottom&quot;:&quot;&quot;,&quot;left&quot;:&quot;&quot;,&quot;isLinked&quot;:true}}\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fcb6d26 e-flex e-con-boxed e-con e-parent\" data-id=\"fcb6d26\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-09555b9 elementor-widget elementor-widget-text-editor\" data-id=\"09555b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-sourcepos=\"3:3-3:200\">This article documents practical detection opportunities for exploitation associated with <a href=\"https:\/\/github.com\/Nightmare-Eclipse\/RedSun\"><strong data-sourcepos=\"3:93-3:116\">REDSUN vulnerability<\/strong><\/a>, using public exploit research only as contextual background for the vulnerability.<\/p><p data-sourcepos=\"5:3-5:419\">This write-up deliberately avoids overfitting on the public proof-of-concept launcher name. Detection logic is centered on behaviors and native artifacts that are more likely to survive renaming, repackaging, or partial code reuse by real-world attackers. The goal is not to detect a specific proof-of-concept filename, but to <strong data-sourcepos=\"5:330-5:418\">generalize forensic guidance for identifying exploitation of the vulnerability itself<\/strong>.<\/p><p data-sourcepos=\"7:3-7:451\">The scope is therefore evidence-driven: the goal is to show what can still be detected on a Windows host using native artifacts only, even when endpoint telemetry is incomplete. In the investigated case, <strong data-sourcepos=\"7:207-7:233\">Sysmon was not deployed<\/strong>. Despite that limitation, the exploitation sequence could still be identified and reconstructed through <strong data-sourcepos=\"7:339-7:450\">Microsoft Defender Operational logs, Defender MPLogs, filesystem timeline artifacts, Prefetch, and ShimCache<\/strong>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bcb9f11 elementor-widget elementor-widget-heading\" data-id=\"bcb9f11\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Executive Summary<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-665536d elementor-widget elementor-widget-text-editor\" data-id=\"665536d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p dir=\"auto\" data-sourcepos=\"11:1-11:570\">REDSUN exploit is a local privilege escalation vulnerability affecting Microsoft Defender remediation behavior. Public exploit code shows a workflow in which a decoy binary is staged in a temporary directory, populated with an EICAR trigger, and intentionally driven into Defender scanning and remediation logic. The exploit then abuses <strong data-sourcepos=\"11:338-11:375\">Cloud Files sync root registration<\/strong>, <strong data-sourcepos=\"11:378-11:401\">placeholder creation<\/strong>, <strong data-sourcepos=\"11:404-11:437\">rename-and-reparse redirection<\/strong>, and the <strong data-sourcepos=\"11:448-11:475\">Storage Tiers Management<\/strong> COM activation path to obtain execution from <code data-sourcepos=\"11:522-11:542\">C:\\Windows\\System32<\/code> as <strong data-sourcepos=\"11:547-11:569\">NT AUTHORITY\\SYSTEM<\/strong>.<\/p><p dir=\"auto\" data-sourcepos=\"13:1-13:332\">This article does <strong data-sourcepos=\"13:19-13:25\">not<\/strong> treat the original public launcher as the primary detection anchor. Instead, it focuses on the forensic artifacts left by the exploitation workflow itself, so that analysts can still investigate cases where the exploit logic has been integrated into another tool, renamed, obfuscated, or otherwise adapted.<\/p><p dir=\"auto\" data-sourcepos=\"15:1-15:360\">Review of the public exploit code aligns well with the observed artifacts from the investigated host. Some of the visible indicators below come directly from hard-coded strings in the public implementation and could be changed by an attacker in a real intrusion. For that reason, they should be treated as useful hunting clues rather than invariant signatures:<\/p><ul dir=\"auto\" data-sourcepos=\"17:1-23:34\"><li data-sourcepos=\"17:1-17:90\">a GUID-named <code data-sourcepos=\"17:16-17:23\">%TEMP%<\/code> staging directory prefixed with <code data-sourcepos=\"17:57-17:61\">RS-<\/code> in the public implementation<\/li><li data-sourcepos=\"18:1-18:79\">a staged binary named <code data-sourcepos=\"18:25-18:50\">TieringEngineService.exe<\/code> in the public implementation<\/li><li data-sourcepos=\"19:1-19:80\">Cloud Files-related placeholder metadata associated with the staging directory<\/li><li data-sourcepos=\"20:1-20:78\">a rename sequence involving <code data-sourcepos=\"20:31-20:36\">.TMP<\/code> and <code data-sourcepos=\"20:42-20:49\">.TEMP2<\/code> in the public implementation<\/li><li data-sourcepos=\"21:1-21:57\">a mount-point reparse redirect to <code data-sourcepos=\"21:37-21:57\">C:\\Windows\\System32<\/code><\/li><li data-sourcepos=\"22:1-22:49\">subsequent execution from <code data-sourcepos=\"22:29-22:49\">C:\\Windows\\System32<\/code><\/li><li data-sourcepos=\"23:1-23:34\">follow-on execution under SYSTEM<\/li><\/ul><p dir=\"auto\" data-sourcepos=\"25:1-25:288\">Even without Sysmon, this activity remains detectable through a combination of <strong data-sourcepos=\"25:80-25:105\">Defender Event ID 1116<\/strong>, <strong data-sourcepos=\"25:108-25:133\">Defender Event ID 1119<\/strong>, <strong data-sourcepos=\"25:136-25:172\">Service Control Manager 7000\/7009<\/strong>, <strong data-sourcepos=\"25:175-25:198\">DistributedCOM 10005<\/strong>, <strong data-sourcepos=\"25:201-25:233\">filesystem timeline artifacts<\/strong>, <strong data-sourcepos=\"25:236-25:247\">Prefetch<\/strong>, <strong data-sourcepos=\"25:250-25:262\">ShimCache<\/strong>, and <strong data-sourcepos=\"25:269-25:287\">Defender MPLogs<\/strong>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4cbc929 elementor-widget elementor-widget-heading\" data-id=\"4cbc929\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Technical Context<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-554a9c9 elementor-widget elementor-widget-text-editor\" data-id=\"554a9c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p dir=\"auto\" data-sourcepos=\"29:1-29:76\">Analysis of the public exploit code shows the following high-level sequence:<\/p><ol dir=\"auto\" data-sourcepos=\"31:1-40:167\"><li data-sourcepos=\"31:1-31:198\">A working directory is created under <code data-sourcepos=\"31:41-31:48\">%TEMP%<\/code> using the pattern <code data-sourcepos=\"31:68-31:78\">RS-{GUID}<\/code> in the public implementation; both the prefix and naming convention are hard-coded and could be changed by an attacker.<\/li><li data-sourcepos=\"32:1-32:194\">A file named <code data-sourcepos=\"32:17-32:42\">TieringEngineService.exe<\/code> is created in that directory in the public implementation; the exact filename is also attacker-controlled if the exploit logic is embedded or modified.<\/li><li data-sourcepos=\"33:1-33:253\">The file is populated with the reversed EICAR string, then reversed in memory before being written, so the on-disk content becomes the standard EICAR trigger; the trigger mechanism is central to the exploit, even if surrounding filenames are changed.<\/li><li data-sourcepos=\"34:1-34:90\">The staged file is opened in a way that triggers Microsoft Defender real-time scanning.<\/li><li data-sourcepos=\"35:1-35:198\">A helper thread monitors <code data-sourcepos=\"35:29-35:37\">\\Device<\/code> for the appearance of a new <code data-sourcepos=\"35:67-35:93\">HarddiskVolumeShadowCopy*<\/code> object, then opens the corresponding file in the shadow copy path and requests a <strong data-sourcepos=\"35:176-35:191\">batch oplock<\/strong> on it.<\/li><li data-sourcepos=\"36:1-36:272\">The exploit deletes the original staged file, registers the temporary directory as a <strong data-sourcepos=\"36:89-36:113\">Cloud Files sync root<\/strong>, and creates a <strong data-sourcepos=\"36:130-36:149\">placeholder file<\/strong> for the staged payload name; the Cloud Files behavior is the durable signal, whereas the exact path and filename may vary.<\/li><li data-sourcepos=\"37:1-37:285\">The original working directory is renamed to <code data-sourcepos=\"37:49-37:63\">RS-{GUID}.TMP<\/code>, recreated under its original name, then the placeholder-backed file path is later renamed to <code data-sourcepos=\"37:159-37:175\">RS-{GUID}.TEMP2<\/code> in the public implementation; these suffixes are implementation-specific and could be changed by an attacker.<\/li><li data-sourcepos=\"38:1-38:106\">The recreated working directory is turned into an <strong data-sourcepos=\"38:54-38:73\">NTFS mount point<\/strong> targeting <code data-sourcepos=\"38:85-38:105\">C:\\Windows\\System32<\/code>.<\/li><li data-sourcepos=\"39:1-39:237\">The exploit repeatedly attempts to create a payload file under <code data-sourcepos=\"39:67-39:87\">C:\\Windows\\System32<\/code>, then copies its own image to that path; the final filename used by the public exploit is mutable, but privileged-path placement is the key behavior.<\/li><li data-sourcepos=\"40:1-41:0\">It finally activates the <strong data-sourcepos=\"40:30-40:57\">Storage Tiers Management<\/strong> COM object using <strong data-sourcepos=\"40:76-40:125\">CLSID <code data-sourcepos=\"40:84-40:123\">{50D185B9-FFF3-4656-92C7-E4018DA4361D}<\/code><\/strong>, which results in execution under SYSTEM.<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-75f003f e-flex e-con-boxed e-con e-parent\" data-id=\"75f003f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fec21f8 elementor-widget elementor-widget-text-editor\" data-id=\"fec21f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"note-custom\">\n<p class=\"markdown-alert-title\">Note<\/p>\n<p data-sourcepos=\"43:3-43:387\">Across artifact sources, the staging directory may appear under multiple closely related forms, including <code data-sourcepos=\"43:109-43:119\">RS-{GUID}<\/code>, <code data-sourcepos=\"43:122-43:136\">RS-{GUID}.TMP<\/code>, and later <code data-sourcepos=\"43:149-43:165\">RS-{GUID}.TEMP2<\/code> in the public implementation. This is expected and reflects different moments in the staging, rename, placeholder, and cleanup sequence. In a real intrusion, these exact string forms may differ if the exploit is modified.<\/p>\n<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-50b229c elementor-widget elementor-widget-heading\" data-id=\"50b229c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Detection Artifacts<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-13f59c5 elementor-widget elementor-widget-heading\" data-id=\"13f59c5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Defender Operational Log \u2014 Event ID 1116<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ea07b5d elementor-widget elementor-widget-text-editor\" data-id=\"ea07b5d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p dir=\"auto\" data-sourcepos=\"49:1-49:107\">The earliest and most actionable signal came from the <code data-sourcepos=\"49:55-49:102\">Microsoft-Windows-Windows Defender\/Operational<\/code> log.<\/p><p dir=\"auto\" data-sourcepos=\"51:1-51:21\">Representative event:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-34ff7af elementor-widget elementor-widget-image\" data-id=\"34ff7af\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1000\" height=\"438\" src=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/04\/redsun_1-1024x449.png\" class=\"attachment-large size-large wp-image-231859\" alt=\"\" srcset=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/04\/redsun_1-1024x449.png 1024w, https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/04\/redsun_1-300x132.png 300w, https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/04\/redsun_1-768x337.png 768w, https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/04\/redsun_1-18x8.png 18w, https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/04\/redsun_1-650x285.png 650w, https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/04\/redsun_1.png 1445w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f6210ff elementor-widget elementor-widget-text-editor\" data-id=\"f6210ff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p dir=\"auto\" data-sourcepos=\"77:1-77:45\">Several fields are operationally significant:<\/p><ol dir=\"auto\" data-sourcepos=\"79:1-81:99\"><li data-sourcepos=\"79:1-79:162\"><code data-sourcepos=\"79:4-79:43\">Threat Name: Virus:DOS\/EICAR_Test_File<\/code> is the first pivot and should be considered suspicious when tied to an executable under a temporary staging directory.<\/li><li data-sourcepos=\"80:1-80:115\"><code data-sourcepos=\"80:4-80:9\">Path<\/code> exposes the staged file path and the temporary directory naming pattern present in the investigated case.<\/li><li data-sourcepos=\"81:1-82:0\"><code data-sourcepos=\"81:4-81:30\">Execution Name: Suspended<\/code> is consistent with interception during the Defender handling window.<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cee69c0 elementor-widget elementor-widget-text-editor\" data-id=\"cee69c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"note-custom\"><p class=\"markdown-alert-title\">Note<\/p>\n<p data-sourcepos=\"84:3-84:285\">The exact filename and directory strings visible in Defender logs may be changed by an attacker in a modified implementation. The stronger detection concept is the combination of an EICAR-triggering executable in a suspicious temporary path and closely related remediation anomalies.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-228c914 e-flex e-con-boxed e-con e-parent\" data-id=\"228c914\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c7e37bd elementor-widget elementor-widget-heading\" data-id=\"c7e37bd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Defender Operational Log \u2014 Event ID 1119<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c8fc1d elementor-widget elementor-widget-text-editor\" data-id=\"5c8fc1d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p dir=\"auto\" data-sourcepos=\"88:1-88:67\">A second strong indicator comes from remediation failure telemetry.<\/p><p dir=\"auto\" data-sourcepos=\"90:1-90:136\">In the observed case, Defender attempted to remediate the detected EICAR file but failed because the file was locked by another process.<\/p><p dir=\"auto\" data-sourcepos=\"92:1-92:30\">Representative values include:<\/p><ul dir=\"auto\" data-sourcepos=\"94:1-97:41\"><li data-sourcepos=\"94:1-94:37\">Threat: <code data-sourcepos=\"94:11-94:37\">Virus:DOS\/EICAR_Test_File<\/code><\/li><li data-sourcepos=\"95:1-95:79\">File: <code data-sourcepos=\"95:9-95:79\">C:\\Users\\&lt;user&gt;\\AppData\\Local\\Temp\\RS-{GUID}\\TieringEngineService.exe<\/code><\/li><li data-sourcepos=\"96:1-96:101\">Error description: <code data-sourcepos=\"96:22-96:101\">The process cannot access the file because it is being used by another process<\/code><\/li><li data-sourcepos=\"97:1-97:41\">Remediation user: <code data-sourcepos=\"97:21-97:41\">NT AUTHORITY\\SYSTEM<\/code><\/li><\/ul><p dir=\"auto\" data-sourcepos=\"99:1-99:279\">This matches the public exploit logic closely. The code explicitly waits for the relevant file to appear through the shadow-copy path and requests a <strong data-sourcepos=\"99:150-99:165\">batch oplock<\/strong> against it, which makes remediation interference a core behavioral feature rather than an accidental side effect.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-25b5764 elementor-widget elementor-widget-text-editor\" data-id=\"25b5764\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"important-custom\"><p class=\"markdown-alert-important\">Important<\/p>\n<p data-sourcepos=\"102:3-102:21\">The combination of:<\/p>\n\n<ul data-sourcepos=\"104:3-106:1\">\n \t<li data-sourcepos=\"104:3-104:60\">Defender Event ID <code data-sourcepos=\"104:23-104:28\">1116<\/code> for <code data-sourcepos=\"104:34-104:60\">Virus:DOS\/EICAR_Test_File<\/code><\/li>\n \t<li data-sourcepos=\"105:3-106:1\">followed by Defender Event ID <code data-sourcepos=\"105:35-105:40\">1119<\/code> with a file-in-use remediation error<\/li>\n<\/ul>\n<p data-sourcepos=\"107:3-107:59\">is a high-value detection pattern for this vulnerability.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e5757fc elementor-widget elementor-widget-heading\" data-id=\"e5757fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Service and COM-Related Events<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d35e6e9 elementor-widget elementor-widget-text-editor\" data-id=\"d35e6e9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p dir=\"auto\" data-sourcepos=\"111:1-111:84\">System event logs can provide correlation points for the privileged execution phase.<\/p><p dir=\"auto\" data-sourcepos=\"113:1-113:24\">Observed events include:<\/p><ul dir=\"auto\" data-sourcepos=\"115:1-120:85\"><li data-sourcepos=\"115:1-116:69\"><strong data-sourcepos=\"115:3-115:47\">Service Control Manager \u2014 Event ID 7009<\/strong><br data-sourcepos=\"115:48-115:50\" \/>Timeout while waiting 30000 milliseconds for <code data-sourcepos=\"116:48-116:69\">TieringEngineService<\/code><\/li><li data-sourcepos=\"117:1-118:50\"><strong data-sourcepos=\"117:3-117:47\">Service Control Manager \u2014 Event ID 7000<\/strong><br data-sourcepos=\"117:48-117:50\" \/>Service start failure for <code data-sourcepos=\"118:29-118:50\">TieringEngineService<\/code><\/li><li data-sourcepos=\"119:1-120:85\"><strong data-sourcepos=\"119:3-119:39\">DistributedCOM \u2014 Event ID 10005<\/strong><br data-sourcepos=\"119:40-119:42\" \/>COM activation failure involving <strong data-sourcepos=\"120:36-120:85\">CLSID <code data-sourcepos=\"120:44-120:83\">{50D185B9-FFF3-4656-92C7-E4018DA4361D}<\/code><\/strong><\/li><\/ul><p dir=\"auto\" data-sourcepos=\"122:1-122:222\">These events are not specific enough to stand on their own, but they become highly useful when they occur close to Defender detections and filesystem artifacts tied to the staged payload and the privileged execution phase.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9f998fd elementor-widget elementor-widget-heading\" data-id=\"9f998fd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Filesystem Forensics<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-62880f4 elementor-widget elementor-widget-heading\" data-id=\"62880f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Filesystem Timeline Artifacts<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6ca323e elementor-widget elementor-widget-text-editor\" data-id=\"6ca323e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p dir=\"auto\" data-sourcepos=\"128:1-128:173\">The most useful filesystem artifacts are not just the temporary directory name, but the sequence of file creation, placeholder, rename, and redirection operations around it.<\/p><p dir=\"auto\" data-sourcepos=\"130:1-130:22\">Observed entries show:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6f743b5 elementor-widget elementor-widget-image\" data-id=\"6f743b5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1000\" height=\"121\" src=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/04\/redsun_2-1024x124.png\" class=\"attachment-large size-large wp-image-231860\" alt=\"\" srcset=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/04\/redsun_2-1024x124.png 1024w, https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/04\/redsun_2-300x36.png 300w, https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/04\/redsun_2-768x93.png 768w, https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/04\/redsun_2-18x2.png 18w, https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/04\/redsun_2-650x79.png 650w, https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/04\/redsun_2.png 1445w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-835a6dd elementor-widget elementor-widget-text-editor\" data-id=\"835a6dd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p dir=\"auto\" data-sourcepos=\"140:1-140:50\">This combined view is important for three reasons:<\/p><ul dir=\"auto\" data-sourcepos=\"142:1-143:173\"><li data-sourcepos=\"142:1-142:103\">The presence of the staged binary inside the working directory shows the initial decoy creation step.<\/li><li data-sourcepos=\"143:1-143:173\">Tea <code data-sourcepos=\"143:7-143:25\">.SyncRootIdentity<\/code> artifact is especially valuable because it directly aligns with the Cloud Files sync-root registration behavior present in the exploit source code.<\/li><\/ul><p dir=\"auto\" data-sourcepos=\"145:1-145:473\">One subtle but important point is that the exploit code first creates the working directory as <code data-sourcepos=\"145:96-145:106\">RS-{GUID}<\/code>, later renames the directory itself to <code data-sourcepos=\"145:147-145:161\">RS-{GUID}.TMP<\/code>, recreates the original directory name, then later renames the placeholder-backed file path to <code data-sourcepos=\"145:258-145:265\">.TEMP2<\/code>. For that reason, different forensic sources may surface slightly different path variants without contradicting one another. In a modified implementation, the same sequence may exist under different strings.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-962c287 elementor-widget elementor-widget-heading\" data-id=\"962c287\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">MFT Timeline<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c518425 elementor-widget elementor-widget-text-editor\" data-id=\"c518425\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The MFT timeline also showed access and execution-adjacent artifacts:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d5bc0e5 elementor-widget elementor-widget-image\" data-id=\"d5bc0e5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1000\" height=\"63\" src=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/04\/redsun_3-1024x64.png\" class=\"attachment-large size-large wp-image-231861\" alt=\"\" srcset=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/04\/redsun_3-1024x64.png 1024w, https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/04\/redsun_3-300x19.png 300w, https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/04\/redsun_3-768x48.png 768w, https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/04\/redsun_3-18x1.png 18w, https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/04\/redsun_3-650x40.png 650w, https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/04\/redsun_3.png 1445w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bc20253 elementor-widget elementor-widget-text-editor\" data-id=\"bc20253\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The first suggests activity consistent with Cloud Files-related processing shortly before execution evidence appears, but should be treated as a correlation artifact rather than a standalone proof point. The second confirms Prefetch creation for the staged payload name used in the investigated case.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f411a04 elementor-widget elementor-widget-heading\" data-id=\"f411a04\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Prefetch<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d34a321 elementor-widget elementor-widget-text-editor\" data-id=\"d34a321\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p dir=\"auto\" data-sourcepos=\"160:1-160:51\">Prefetch provides strong native proof of execution.<\/p><p dir=\"auto\" data-sourcepos=\"162:1-162:38\">Observed execution artifacts included:<\/p><ul dir=\"auto\" data-sourcepos=\"164:1-166:34\"><li data-sourcepos=\"164:1-164:48\"><code data-sourcepos=\"164:3-164:48\">C:\\Windows\\System32\\TieringEngineService.exe<\/code><\/li><li data-sourcepos=\"165:1-165:31\"><code data-sourcepos=\"165:3-165:31\">C:\\Windows\\System32\\c[m]d.exe<\/code><\/li><li data-sourcepos=\"166:1-166:34\"><code data-sourcepos=\"166:3-166:34\">C:\\Windows\\System32\\whoami.exe<\/code><\/li><\/ul><p dir=\"auto\" data-sourcepos=\"168:1-168:251\">This sequence is important because it supports the expected post-exploitation flow: privileged payload execution followed by shell launch and privilege verification. In a real intrusion, the child processes may differ depending on operator objectives.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8993cf0 elementor-widget elementor-widget-heading\" data-id=\"8993cf0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Additional Native Artifacts<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c3ab45c elementor-widget elementor-widget-heading\" data-id=\"c3ab45c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Defender MPLogs, MPDetection and Detections.log<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d4932b2 elementor-widget elementor-widget-text-editor\" data-id=\"d4932b2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p dir=\"auto\" data-sourcepos=\"174:1-174:68\">Defender MPLogs and MPDetection add important depth to the analysis.<\/p><p dir=\"auto\" data-sourcepos=\"176:1-176:26\">Observed elements include:<\/p><ul dir=\"auto\" data-sourcepos=\"178:1-181:83\"><li data-sourcepos=\"178:1-178:97\">repeated detections of the staged payload under <code data-sourcepos=\"178:51-178:97\">C:\\Users\\&lt;user&gt;\\AppData\\Local\\Temp\\RS-{GUID}\\<\/code><\/li><li data-sourcepos=\"179:1-179:21\">quarantine attempts<\/li><li data-sourcepos=\"180:1-180:26\">explicit remove failures<\/li><li data-sourcepos=\"181:1-181:83\">references to <code data-sourcepos=\"181:17-181:83\">\\Device\\HarddiskVolume*\\Windows\\System32\\TieringEngineService.exe<\/code><\/li><\/ul><p dir=\"auto\" data-sourcepos=\"183:1-183:24\">Representative examples:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-17e8e84 elementor-widget elementor-widget-image\" data-id=\"17e8e84\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"299\" src=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/04\/redsun_4-1024x306.png\" class=\"attachment-large size-large wp-image-231862\" alt=\"\" srcset=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/04\/redsun_4-1024x306.png 1024w, https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/04\/redsun_4-300x90.png 300w, https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/04\/redsun_4-768x229.png 768w, https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/04\/redsun_4-18x5.png 18w, https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/04\/redsun_4-650x194.png 650w, https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/04\/redsun_4.png 1447w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d4120fb elementor-widget elementor-widget-text-editor\" data-id=\"d4120fb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"important-custom\"><p class=\"markdown-alert-important\">Important<\/p>\n<p data-sourcepos=\"197:3-197:247\">If available, <code data-sourcepos=\"197:17-197:82\">C:\\ProgramData\\Microsoft\\Windows Defender\\Scans\\History\\Service\\<\/code> should be preserved early, as it may contains evidences related to TieringEngineService.exe. MPLogs can retain details that are not obvious from Event Viewer alone.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-89e8751 elementor-widget elementor-widget-heading\" data-id=\"89e8751\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Correlated Forensic Timeline From the Investigated Host<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5406a28 elementor-widget elementor-widget-text-editor\" data-id=\"5406a28\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The following timeline consolidates the most relevant host-level events observed on the investigated system.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b05f81a elementor-widget elementor-widget-bdt-table\" data-id=\"b05f81a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"bdt-table.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"bdt-table bdt-table-default-responsive\" id=\"bdt-table-b05f81a\">\n\n\n\t\t\t<table>\n<thead>\n<tr><th>Timestamp (UTC)<\/th><th>Source<\/th><th>Event<\/th><\/tr>\n<\/thead>\n<tbody>\n\n<tr>\n            <td>2026-04-18 12:24:20<\/td>\n            <td>MFT<\/td>\n            <td>Creation of\n                C:\\Users\\&lt;user&gt;\\AppData\\Local\\Temp\\RS-{GUID}.TMP:${GUID}.SyncRootIdentity\n            <\/td>\n        <\/tr>\n <tr>\n            <td>2026-04-18 12:24:20<\/td>\n            <td>MFT<\/td>\n            <td>Creation of C:\\Users\\&lt;user&gt;\\AppData\\Local\\Temp\\RS-{GUID}.TMP\\TIERIN~1.EXE<\/td>\n        <\/tr>\n        <tr>\n            <td>2026-04-18 12:24:20<\/td>\n            <td>MFT<\/td>\n            <td>Creation of\n                C:\\Users\\&lt;user&gt;\\AppData\\Local\\Temp\\RS-{GUID}.TMP\\TieringEngineService.exe\n            <\/td>\n        <\/tr>\n<tr>\n            <td>2026-04-18 12:24:20<\/td>\n            <td>Defender Event ID 1116<\/td>\n            <td>Detection of Virus:DOS\/EICAR_Test_File on\n                C:\\Users\\&lt;user&gt;\\AppData\\Local\\Temp\\RS-{GUID}\\TieringEngineService.exe\n            <\/td>\n        <\/tr>\n        <tr>\n            <td>2026-04-18 12:25:11<\/td>\n            <td>Prefetch<\/td>\n            <td>Execution of VSSVC.EXE and related service-host activity<\/td>\n        <\/tr>\n<tr>\n            <td>2026-04-18 12:25:13<\/td>\n            <td>Defender Event ID 1119<\/td>\n            <td>Remediation failure because the file TieringEngineService.exe is in use by another\n                process<\/td>\n        <\/tr>\n        <tr>\n            <td>2026-04-18 12:25:13<\/td>\n            <td>Service Control Manager \u2014 7009<\/td>\n            <td>Timeout while waiting for TieringEngineService<\/td>\n        <\/tr>\n<tr>\n            <td>2026-04-18 12:25:13<\/td>\n            <td>Service Control Manager \u2014 7000<\/td>\n            <td>Service start failure for TieringEngineService<\/td>\n        <\/tr>\n        <tr>\n            <td>2026-04-18 12:25:13<\/td>\n            <td>DistributedCOM \u2014 10005<\/td>\n            <td>COM-related failure involving CLSID {50D185B9-FFF3-4656-92C7-E4018DA4361D}<\/td>\n        <\/tr>\n        <tr>\n            <td>2026-04-18 12:25:13<\/td>\n            <td>Prefetch<\/td>\n            <td>Execution of C:\\Windows\\System32\\TieringEngineService.exe<\/td>\n        <\/tr>\n        <tr>\n            <td>2026-04-18 12:25:13<\/td>\n            <td>Prefetch<\/td>\n            <td>Execution of C:\\Windows\\System32\\c[m]d.exe<\/td>\n        <\/tr>\n<tr>\n            <td>2026-04-18 12:25:16<\/td>\n            <td>Prefetch<\/td>\n            <td>Execution of C:\\Windows\\System32\\whoami.exe<\/td>\n        <\/tr>\n        <tr>\n            <td>2026-04-18 12:27:34<\/td>\n            <td>Defender Event ID 1116<\/td>\n            <td>On this host, Defender additionally detected Exploit:Win32\/DfndrPERedSun.BB on\n                C:\\Windows\\System32\\TieringEngineService.exe\n            <\/td>\n        <\/tr>\n        <tr>\n            <td>2026-04-18 12:27:57<\/td>\n            <td>Defender Event ID 1117<\/td>\n            <td>Successful quarantine\/remediation action against Exploit:Win32\/DfndrPERedSun.BB<\/td>\n        <\/tr>\n<\/tbody>\n<\/table>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9390f07 elementor-widget elementor-widget-text-editor\" data-id=\"9390f07\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p dir=\"auto\" data-sourcepos=\"220:1-220:57\">This timeline supports a coherent exploitation narrative:<\/p><ol dir=\"auto\" data-sourcepos=\"222:1-229:165\"><li data-sourcepos=\"222:1-222:93\">A temporary GUID-named staging directory is created and populated with a decoy executable.<\/li><li data-sourcepos=\"223:1-223:77\">Cloud Files-related registration artifact appears via <code data-sourcepos=\"223:58-223:76\">.SyncRootIdentity<\/code>.<\/li><li data-sourcepos=\"224:1-224:42\">Defender detects the EICAR-based decoy.<\/li><li data-sourcepos=\"225:1-225:92\">Remediation fails because the file is being actively held during the exploitation window.<\/li><li data-sourcepos=\"226:1-226:79\">Service and COM-related errors appear around the privileged execution phase.<\/li><li data-sourcepos=\"227:1-227:51\">Execution pivots into a <code data-sourcepos=\"227:28-227:37\">System32<\/code> payload path.<\/li><li data-sourcepos=\"228:1-228:109\">Follow-on <code data-sourcepos=\"228:14-228:22\">c[m]d.exe<\/code> and <code data-sourcepos=\"228:28-228:39\">whoami.exe<\/code> execution strongly suggest successful SYSTEM-level post-exploitation.<\/li><li data-sourcepos=\"229:1-230:0\">On the investigated host, Defender later generated additional detections under <code data-sourcepos=\"229:83-229:114\">Exploit:Win32\/DfndrPERedSun.BB<\/code> and eventually quarantined the <code data-sourcepos=\"229:147-229:156\">System32<\/code> payload.<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2c1c5cf elementor-widget elementor-widget-heading\" data-id=\"2c1c5cf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Hardening Recommendations<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a7180ab elementor-widget elementor-widget-text-editor\" data-id=\"a7180ab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li data-sourcepos=\"233:1-233:134\">Treat suspicious EICAR detections as potentially hostile when they are associated with executable staging and remediation anomalies.<\/li><li data-sourcepos=\"234:1-234:60\">Monitor for Defender remediation failures on active files.<\/li><li data-sourcepos=\"235:1-235:86\">Collect and retain Windows Defender related event logs, MPLogs and MPDetection logs.<\/li><li data-sourcepos=\"236:1-236:183\">Monitor and alert for TieringEngineService outside of expected behavior, especially when correlated with recent Defender remediation anomalies and file creation in %TEMP% directory.<\/li><li data-sourcepos=\"237:1-238:0\">If Sysmon is available, add process creation, file create, and file delete coverage.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8162a96 elementor-widget elementor-widget-heading\" data-id=\"8162a96\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Conclusion<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-029c739 elementor-widget elementor-widget-text-editor\" data-id=\"029c739\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p dir=\"auto\" data-sourcepos=\"241:1-241:230\">This article intentionally avoids over-reliance on the original public proof-of-concept binary name and instead focuses on forensic evidence more likely to persist in real intrusions where the exploit code is embedded or modified.<\/p><p dir=\"auto\" data-sourcepos=\"243:1-243:52\">The strongest practical detection opportunities are:<\/p><ul dir=\"auto\" data-sourcepos=\"245:1-252:75\"><li data-sourcepos=\"245:1-245:48\">Defender <code data-sourcepos=\"245:12-245:17\">1116<\/code> on <code data-sourcepos=\"245:22-245:48\">Virus:DOS\/EICAR_Test_File<\/code><\/li><li data-sourcepos=\"246:1-246:61\">Defender <code data-sourcepos=\"246:12-246:17\">1119<\/code> remediation failure with file-lock symptoms<\/li><li data-sourcepos=\"247:1-247:50\">Suspicious temporary staging and rename behavior<\/li><li data-sourcepos=\"248:1-248:60\">Cloud Files sync-root artifact such as <code data-sourcepos=\"248:42-248:60\">.SyncRootIdentity<\/code><\/li><li data-sourcepos=\"249:1-249:51\">Placement or execution from <code data-sourcepos=\"249:31-249:51\">C:\\Windows\\System32<\/code><\/li><li data-sourcepos=\"250:1-250:59\">DCOM correlation around the Storage Tiers activation path<\/li><li data-sourcepos=\"251:1-251:82\">On some systems, later Defender detection under <code data-sourcepos=\"251:51-251:82\">Exploit:Win32\/DfndrPERedSun.BB<\/code><\/li><li data-sourcepos=\"252:1-252:75\">Defender MPLogs showing failed remediation and privileged-path references<\/li><\/ul><p dir=\"auto\" data-sourcepos=\"254:1-254:120\">Taken together, these artifacts allow defenders to move from a generic Defender detection to a much stronger conclusion.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4885f16 e-flex e-con-boxed e-con e-parent\" data-id=\"4885f16\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-273d6fb e-flex e-con-boxed e-con e-parent\" data-id=\"273d6fb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-008ea8e e-flex e-con-boxed e-con e-parent\" data-id=\"008ea8e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f2434c2 e-flex e-con-boxed e-con e-parent\" data-id=\"f2434c2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2a186ea e-flex e-con-boxed e-con e-parent\" data-id=\"2a186ea\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>This article documents practical detection opportunities for exploitation associated with REDSUN vulnerability, using public exploit research only as contextual background for the vulnerability.<br \/>\nThis write-up deliberately avoids over fitting on the public proof-of-concept launcher name. Detection logic is centered on behaviors and native artifacts that are more likely to survive renaming, repackaging, or partial code reuse by real-world attackers. The goal is not to detect a specific proof-of-concept filename, but to generalize forensic guidance for identifying exploitation of the vulnerability itself.<br \/>\nThe scope is therefore evidence-driven: the goal is to show what can still be detected on a Windows host using native artifacts only, even when endpoint telemetry is incomplete. In the investigated case, Sysmon was not deployed. Despite that limitation, the exploitation sequence could still be identified and reconstructed through Microsoft Defender Operational logs, Defender MPLogs, filesystem timeline artifacts, Prefetch, and ShimCache.<\/p>","protected":false},"author":55,"featured_media":231752,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[176],"class_list":["post-231730","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cert","tag-incident-response"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Redsun : opportunit\u00e9s de d\u00e9tection pratiques - INTRINSEC<\/title>\n<meta name=\"description\" content=\"D\u00e9couvrez les opportunit\u00e9s de d\u00e9tection pratiques li\u00e9es \u00e0 la vuln\u00e9rabilit\u00e9 REDSUN et apprenez \u00e0 identifier les comportements suspects.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intrinsec.com\/en\/redsun-practical-detection-artifacts\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"REDSUN - Practical Detection Artifacts Under Real-World Constraints\" \/>\n<meta property=\"og:description\" content=\"D\u00e9couvrez les opportunit\u00e9s de d\u00e9tection pratiques li\u00e9es \u00e0 la vuln\u00e9rabilit\u00e9 REDSUN et apprenez \u00e0 identifier les comportements suspects.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intrinsec.com\/en\/redsun-practical-detection-artifacts\/\" \/>\n<meta property=\"og:site_name\" content=\"INTRINSEC\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-24T13:27:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-24T14:30:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/04\/redsun-e1776782736441.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1027\" \/>\n\t<meta property=\"og:image:height\" content=\"370\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"CERT Intrinsec\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"CERT Intrinsec\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/redsun-practical-detection-artifacts\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/redsun-practical-detection-artifacts\\\/\"},\"author\":{\"name\":\"CERT Intrinsec\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/1ec04601123170d245331ea69b78356e\"},\"headline\":\"REDSUN &#8211; Practical Detection Artifacts Under Real-World Constraints\",\"datePublished\":\"2026-04-24T13:27:04+00:00\",\"dateModified\":\"2026-04-24T14:30:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/redsun-practical-detection-artifacts\\\/\"},\"wordCount\":1843,\"image\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/redsun-practical-detection-artifacts\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.intrinsec.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/redsun-e1776782736441.png\",\"keywords\":[\"Incident Response\"],\"articleSection\":[\"CERT\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/redsun-practical-detection-artifacts\\\/\",\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/redsun-practical-detection-artifacts\\\/\",\"name\":\"Redsun : opportunit\u00e9s de d\u00e9tection pratiques - INTRINSEC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/redsun-practical-detection-artifacts\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/redsun-practical-detection-artifacts\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.intrinsec.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/redsun-e1776782736441.png\",\"datePublished\":\"2026-04-24T13:27:04+00:00\",\"dateModified\":\"2026-04-24T14:30:52+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/1ec04601123170d245331ea69b78356e\"},\"description\":\"D\u00e9couvrez les opportunit\u00e9s de d\u00e9tection pratiques li\u00e9es \u00e0 la vuln\u00e9rabilit\u00e9 REDSUN et apprenez \u00e0 identifier les comportements suspects.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/redsun-practical-detection-artifacts\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.intrinsec.com\\\/redsun-practical-detection-artifacts\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/redsun-practical-detection-artifacts\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/redsun-e1776782736441.png\",\"contentUrl\":\"https:\\\/\\\/www.intrinsec.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/redsun-e1776782736441.png\",\"width\":1027,\"height\":370},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/redsun-practical-detection-artifacts\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.intrinsec.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"REDSUN &#8211; Practical Detection Artifacts Under Real-World Constraints\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#website\",\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/\",\"name\":\"INTRINSEC\",\"description\":\"Notre m\u00e9tier , Prot\u00e9ger le v\u00f4tre\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.intrinsec.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/1ec04601123170d245331ea69b78356e\",\"name\":\"CERT Intrinsec\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/48491cc0395b3eed17e56104e0ad5a174d5133baeb103718533f3bc781e03778?s=96&d=retro&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/48491cc0395b3eed17e56104e0ad5a174d5133baeb103718533f3bc781e03778?s=96&d=retro&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/48491cc0395b3eed17e56104e0ad5a174d5133baeb103718533f3bc781e03778?s=96&d=retro&r=g\",\"caption\":\"CERT Intrinsec\"},\"sameAs\":[\"https:\\\/\\\/www.intrinsec.com\\\/category\\\/cert\\\/\"],\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/en\\\/author\\\/certintrinsec\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Redsun : opportunit\u00e9s de d\u00e9tection pratiques - INTRINSEC","description":"D\u00e9couvrez les opportunit\u00e9s de d\u00e9tection pratiques li\u00e9es \u00e0 la vuln\u00e9rabilit\u00e9 REDSUN et apprenez \u00e0 identifier les comportements suspects.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intrinsec.com\/en\/redsun-practical-detection-artifacts\/","og_locale":"en_US","og_type":"article","og_title":"REDSUN - Practical Detection Artifacts Under Real-World Constraints","og_description":"D\u00e9couvrez les opportunit\u00e9s de d\u00e9tection pratiques li\u00e9es \u00e0 la vuln\u00e9rabilit\u00e9 REDSUN et apprenez \u00e0 identifier les comportements suspects.","og_url":"https:\/\/www.intrinsec.com\/en\/redsun-practical-detection-artifacts\/","og_site_name":"INTRINSEC","article_published_time":"2026-04-24T13:27:04+00:00","article_modified_time":"2026-04-24T14:30:52+00:00","og_image":[{"width":1027,"height":370,"url":"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/04\/redsun-e1776782736441.png","type":"image\/png"}],"author":"CERT Intrinsec","twitter_card":"summary_large_image","twitter_misc":{"Written by":"CERT Intrinsec","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.intrinsec.com\/redsun-practical-detection-artifacts\/#article","isPartOf":{"@id":"https:\/\/www.intrinsec.com\/redsun-practical-detection-artifacts\/"},"author":{"name":"CERT Intrinsec","@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/1ec04601123170d245331ea69b78356e"},"headline":"REDSUN &#8211; Practical Detection Artifacts Under Real-World Constraints","datePublished":"2026-04-24T13:27:04+00:00","dateModified":"2026-04-24T14:30:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intrinsec.com\/redsun-practical-detection-artifacts\/"},"wordCount":1843,"image":{"@id":"https:\/\/www.intrinsec.com\/redsun-practical-detection-artifacts\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/04\/redsun-e1776782736441.png","keywords":["Incident Response"],"articleSection":["CERT"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.intrinsec.com\/redsun-practical-detection-artifacts\/","url":"https:\/\/www.intrinsec.com\/redsun-practical-detection-artifacts\/","name":"Redsun : opportunit\u00e9s de d\u00e9tection pratiques - INTRINSEC","isPartOf":{"@id":"https:\/\/www.intrinsec.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intrinsec.com\/redsun-practical-detection-artifacts\/#primaryimage"},"image":{"@id":"https:\/\/www.intrinsec.com\/redsun-practical-detection-artifacts\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/04\/redsun-e1776782736441.png","datePublished":"2026-04-24T13:27:04+00:00","dateModified":"2026-04-24T14:30:52+00:00","author":{"@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/1ec04601123170d245331ea69b78356e"},"description":"D\u00e9couvrez les opportunit\u00e9s de d\u00e9tection pratiques li\u00e9es \u00e0 la vuln\u00e9rabilit\u00e9 REDSUN et apprenez \u00e0 identifier les comportements suspects.","breadcrumb":{"@id":"https:\/\/www.intrinsec.com\/redsun-practical-detection-artifacts\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intrinsec.com\/redsun-practical-detection-artifacts\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.intrinsec.com\/redsun-practical-detection-artifacts\/#primaryimage","url":"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/04\/redsun-e1776782736441.png","contentUrl":"https:\/\/www.intrinsec.com\/wp-content\/uploads\/2026\/04\/redsun-e1776782736441.png","width":1027,"height":370},{"@type":"BreadcrumbList","@id":"https:\/\/www.intrinsec.com\/redsun-practical-detection-artifacts\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.intrinsec.com\/"},{"@type":"ListItem","position":2,"name":"REDSUN &#8211; Practical Detection Artifacts Under Real-World Constraints"}]},{"@type":"WebSite","@id":"https:\/\/www.intrinsec.com\/#website","url":"https:\/\/www.intrinsec.com\/","name":"INTRINSEC","description":"Our job is to protect yours.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intrinsec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/1ec04601123170d245331ea69b78356e","name":"Intrinsic CERT","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/48491cc0395b3eed17e56104e0ad5a174d5133baeb103718533f3bc781e03778?s=96&d=retro&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/48491cc0395b3eed17e56104e0ad5a174d5133baeb103718533f3bc781e03778?s=96&d=retro&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/48491cc0395b3eed17e56104e0ad5a174d5133baeb103718533f3bc781e03778?s=96&d=retro&r=g","caption":"CERT Intrinsec"},"sameAs":["https:\/\/www.intrinsec.com\/category\/cert\/"],"url":"https:\/\/www.intrinsec.com\/en\/author\/certintrinsec\/"}]}},"_links":{"self":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts\/231730","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/users\/55"}],"replies":[{"embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/comments?post=231730"}],"version-history":[{"count":25,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts\/231730\/revisions"}],"predecessor-version":[{"id":231865,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts\/231730\/revisions\/231865"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/media\/231752"}],"wp:attachment":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/media?parent=231730"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/categories?post=231730"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/tags?post=231730"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}