Tag
high
advisory
PowerShell P/Invoke Process Injection API Chain Detection
2 rules 8 TTPsThis analytic detects PowerShell code that uses P/Invoke to call Windows API functions associated with process injection, such as VirtualAlloc, WriteProcessMemory, and CreateRemoteThread, indicating potential malicious activity.
PowerShell +3
process-injection
pinvoke
defense-evasion
2r
8t
high
advisory
PowerShell P/Invoke API Chain for Process Injection
3 rules 7 TTPsThis brief details detection of PowerShell scripts leveraging P/Invoke API calls to perform process injection, covering techniques like self-injection, remote thread injection, APC injection, thread-context hijacking, process hollowing, section-map injection, reflective DLL loading, and DLL injection.
PowerShell
process-injection
pinvoke
3r
7t