host-interaction/process/inject
rule:
meta:
name: inject pe
namespace: host-interaction/process/inject
authors:
- 0x534a@mailbox.org
scopes:
static: function
dynamic: unsupported # requires characteristic, mnemonic features
att&ck:
- Defense Evasion::Process Injection::Portable Executable Injection [T1055.002]
- Defense Evasion::Reflective Code Loading [T1620]
references:
- https://www.elastic.co/de/blog/ten-process-injection-techniques-technical-survey-common-and-trending-process
examples:
- ce8d7590182db2e51372a4a04d6a0927a65b2640739f9ec01cfd6c143b1110da:0x4014E0
features:
- and:
- characteristic: loop
- optional:
- or:
- match: open process
- match: host-interaction/process/create
- match: allocate or change RWX memory
- basic block:
- description: virtual address offset calculation
- and:
- mnemonic: and
- number: 0x0FFF
- match: write process memory
- match: create thread
last edited: 2023-11-24 10:34:28