Skip to content
Threat Feed

Tag

Process Injection

11 briefs RSS
high advisory

Windows Parent Process PID Spoofing Detection

Adversaries use parent process PID spoofing to evade detection by creating processes with mismatched parent-child relationships, hindering process monitoring and potentially elevating privileges on Windows systems.

Elastic Defend defense-evasion process-injection windows
3r 1t
high advisory

Potential Process Injection via PowerShell

This detection identifies PowerShell scripts leveraging Win32 APIs for memory allocation, process access, and thread creation, indicative of potential process injection or in-memory payload execution on Windows systems.

Windows Defender Advanced Threat Protection process injection powershell defense evasion
2r 2t
high advisory

Uncommon Svchost Command Line Parameters Indicate Potential Masquerading or Injection

Detection of svchost.exe executing with uncommon command-line parameters, excluding known legitimate patterns, which may indicate file masquerading, process injection, or process hollowing.

Windows defense-evasion privilege-escalation process-injection
2r 2t
high advisory

Potential LSASS Clone Creation via PssCaptureSnapShot

Detection of LSASS process cloning using PssCaptureSnapShot, where the parent process is also LSASS, indicating a potential attempt to dump LSASS memory for credential access.

credential-access lsass process-injection
2r 1t
high advisory

PowerShell P/Invoke Process Injection API Chain Detection

This analytic detects PowerShell code that uses P/Invoke to call Windows API functions associated with process injection, such as VirtualAlloc, WriteProcessMemory, and CreateRemoteThread, indicating potential malicious activity.

PowerShell +3 process-injection pinvoke defense-evasion
2r 8t
low advisory

MSBuild Process Injection Detection

The Microsoft Build Engine (MSBuild) is being abused to perform process injection by creating threads in other processes, a technique used to evade detection and potentially escalate privileges.

MSBuild defense-evasion privilege-escalation process-injection
2r 3t
medium advisory

Suspicious Endpoint Security Parent Process Detected

This rule detects suspicious parent processes of endpoint security solutions such as Elastic Defend, Microsoft Defender, and SentinelOne, indicating potential process hollowing or code injection attempts to evade detection.

Elastic Defend +2 defense-evasion process-injection windows
2r 2t
high advisory

PowerShell P/Invoke API Chain for Process Injection

This brief details detection of PowerShell scripts leveraging P/Invoke API calls to perform process injection, covering techniques like self-injection, remote thread injection, APC injection, thread-context hijacking, process hollowing, section-map injection, reflective DLL loading, and DLL injection.

PowerShell process-injection pinvoke
3r 7t
medium advisory

Unusual Parent-Child Relationship Detection

This rule identifies Windows programs run from unexpected parent processes, which could indicate masquerading or other strange activity on a system, potentially indicating process injection, masquerading, access token manipulation, or parent PID spoofing.

Microsoft Defender XDR +1 privilege-escalation defense-evasion windows process-injection masquerading access-token-manipulation parent-pid-spoofing
3r 4t
medium advisory

Suspicious Process Creation Followed by Memory Access from Unknown Region

The rule identifies suspicious process creation where a process is created and immediately accessed from an unknown memory code region by the same parent process, indicating a potential code injection attempt, specifically process hollowing, commonly targeting processes spawned by Microsoft Office applications, scripting engines, and command-line tools for defense evasion.

Office +2 defense-evasion process-injection windows
2r 1t
high advisory

Unusual Child Process from a System Virtual Process

A suspicious child process of the Windows virtual system process is detected, potentially indicating code injection and defense evasion.

Elastic Defend +2 defense-evasion process-injection windows
2r 1t