Dynamic-link Library Injection
Adversaries may inject dynamic-link libraries (DLLs) into processes in order to evade process-based defenses as well as possibly elevate privileges. DLL injection is a method of executing arbitrary code in the address space of a separate live process. DLL injection is commonly performed by writing the path to a DLL in the virtual address space of the target process before loading the DLL by invoking a new thread. The write can be performed with native Windows API calls such as <code>VirtualAl...
BY SOURCE
PROCEDURES (7)
Auto-extracted: 5 detections for inject
Auto-extracted: 1 detections for api
Auto-extracted: 1 detections for persist
Auto-extracted: 1 detections for powershell
Auto-extracted: 1 detections for remote
Auto-extracted: 1 detections for persist
Auto-extracted: 1 detections for remote