Process Injection
Adversaries may inject code into processes in order to evade process-based defenses as well as possibly elevate privileges. Process injection is a method of executing arbitrary code in the address space of a separate live process. Running code in the context of another process may allow access to the process's memory, system/network resources, and possibly elevated privileges. Execution via process injection may also evade detection from security products since the execution is masked under a le...
BY SOURCE
PROCEDURES (48)
Auto-extracted: 5 detections for lateral
Auto-extracted: 5 detections for c2
Auto-extracted: 4 detections for child process
Auto-extracted: 4 detections for remote thread
Auto-extracted: 4 detections for general monitoring
Auto-extracted: 3 detections for inject
Auto-extracted: 2 detections for inject
Auto-extracted: 2 detections for command and control
Auto-extracted: 2 detections for dump
Auto-extracted: 2 detections for command and control
Auto-extracted: 2 detections for privilege
Auto-extracted: 2 detections for child process
Auto-extracted: 2 detections for base64
Auto-extracted: 2 detections for powershell
Auto-extracted: 2 detections for c2
Auto-extracted: 1 detections for privilege
Auto-extracted: 1 detections for process creation monitoring
Auto-extracted: 1 detections for privilege
Auto-extracted: 1 detections for evasion
Auto-extracted: 1 detections for bypass
Auto-extracted: 1 detections for masquerad
Auto-extracted: 1 detections for hollow
Auto-extracted: 1 detections for suspicious
Auto-extracted: 1 detections for process access
Auto-extracted: 1 detections for hollow
Auto-extracted: 1 detections for child process
Auto-extracted: 1 detections for masquerad
Auto-extracted: 1 detections for service
Auto-extracted: 1 detections for parent process
Auto-extracted: 1 detections for service
Auto-extracted: 1 detections for evasion
Auto-extracted: 1 detections for parent process
Auto-extracted: 1 detections for process access
Auto-extracted: 1 detections for evasion
Auto-extracted: 1 detections for hollow
Auto-extracted: 1 detections for bypass
Auto-extracted: 1 detections for named pipe
Auto-extracted: 1 detections for parent process
Auto-extracted: 1 detections for suspicious
Auto-extracted: 1 detections for suspicious
Auto-extracted: 1 detections for dump
Auto-extracted: 1 detections for named pipe
Auto-extracted: 1 detections for suspicious
Auto-extracted: 1 detections for inject
Auto-extracted: 1 detections for module load monitoring
Auto-extracted: 1 detections for credential
Auto-extracted: 1 detections for token
Auto-extracted: 1 detections for unusual