Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Group Name

Training Data - Process Injection (Hive)

Scenario

In this training scenario, we will execute a ransomware payload via process injection into an already running Svchost.exe. The Svchost in question is a normal system operation, long running, signed, and under the LocalSystem user account.

...

In order to sort through the many process injections that happen on a system at any given time, we can refer to both the time of the incident, and the pid of the flagged process. Normally we will start with a few pids of suspicious responses, and go up the chain of injections and creation to gain the full story.

Image RemovedImage Added

We already know that no one should be injecting into Svchost in this way, but definitely not this process! From here on we can treat this process as if it’s “malware.exe” and see who ran it, since someone must have.

...

Relevant documentation

  • Process Injection [Stub Index / Parent Page]

  • Mitre T1559 - Inter-Process communication can provide control over the target process from the injector once the injection is complete.

  • Mitre T1106 - Native APIs are often the closest access to operating system functionality for accessing files, running processes, and more.

  • Mitre T1569 - Injecting into a system service such as an existing svchost can disguise malicious code to be reported as running from a well known and trusted process.

  • Mitre T1055 - Process injection, usually used to run malicious code in a target process while allowing the original process to continue.

...