host-interaction/process/inject

inject shellcode using extra window memory

rule:
  meta:
    name: inject shellcode using extra window memory
    namespace: host-interaction/process/inject
    authors:
      - jakub.jozwiak@mandiant.com
    scopes:
      static: function
      dynamic: thread
    att&ck:
      - Defense Evasion::Process Injection::Extra Window Memory Injection [T1055.011]
    mbc:
      - Defense Evasion::Process Injection [E1055]
    references:
      - https://unprotect.it/technique/extra-window-memory-injection/
      - https://github.com/SafeBreach-Labs/pinjectra/blob/master/Pinjector/SetWindowLongPtrA.cpp
    examples:
      - 592cfd22bba96ef3aab566fe7bf82aff5e1b4130856d1f7f847d03d4689af7e7:0x1400010C0
  features:
    - and:
      - match: find taskbar
      - match: open process
      - match: write process memory
      - or:
        - api: SetWindowLong
        - api: SetWindowLongPtr
      - or:
        - api: PostMessage
        - api: SendNotifyMessage

last edited: 2023-11-24 10:34:28