What was the initial attack vector used by the adversary, and through which protocol was it delivered? Phishing Email pop What protocol has been used to notify that the exploit was successful? ICMP What CVE is related to this vulnerability? Format CVE-YYYY-ID CVE-2024-5830 Which specific assembly instruction helps enable the execution of the final command string? mov byte [rcx+8], 0 What technique has been used to deliver the final stage of the payload within the exploit? JIT Spraying Which custom or native function has been called to execute the final command in the exploit? WinExec What is the full command executed at the end of the exploit? ping db What is the value of the offset added to a register in order to retrieve the command string? (in hex) 0x252 Which structure/location does the exploit search to find the import/dispatch table? trusted cage Which two V8/DOM object types does the exploit confuse? DOMRect AudioBuffer