Malware Theory - Process Injection

แชร์
ฝัง
  • เผยแพร่เมื่อ 25 พ.ย. 2024

ความคิดเห็น • 40

  • @MalwareAnalysisForHedgehogs
    @MalwareAnalysisForHedgehogs  3 ปีที่แล้ว +2

    This is an overview to all common process injection techniques used by malware, including AtomBombing, Process Hollowing aka RunPE, Process Doppelgänging.
    Buy me a coffee: ko-fi.com/struppigel
    Follow me on Twitter: twitter.com/struppigel
    My process Injection overview infographic: struppigel.blogspot.com/2017/07/process-injection-info-graphic.html
    Process Injection Techniques Gotta Catch Them All: i.blackhat.com/USA-19/Thursday/us-19-Kotler-Process-Injection-Techniques-Gotta-Catch-Them-All.pdf
    Atom bombing: www.fortinet.com/blog/threat-research/atombombing-brand-new-code-injection-technique-for-windows
    Atom bombing: www.enisa.europa.eu/publications/info-notes/atombombing-2013-a-new-code-injection-attack
    Process Doppelgänging: hshrzd.wordpress.com/2017/12/18/process-doppelganging-a-new-way-to-impersonate-a-process/
    Hasherezade's video on creating the illusion of executing a TXT file: th-cam.com/video/XmWOj-cfixs/w-d-xo.html
    DLL injection en.wikipedia.org/wiki/DLL_injection
    DLL Injection via LoadLibrary/CreateRemoteThread: www.codeproject.com/Articles/4610/Three-Ways-to-Inject-Your-Code-into-Another-Proces
    DLL Search Order Hijacking (DLL injection that is not process injection): dmcxblue.gitbook.io/red-team-notes/persistence/dll-search-order-hijacking
    Backdooring PE files with shellcode (code injection that is not process injection): www.ired.team/offensive-security/code-injection-process-injection/backdooring-portable-executables-pe-with-shellcode

  • @OALABS
    @OALABS 3 ปีที่แล้ว +18

    This is a fantastic diagram for explaining how things work, I wish I had though of this! I really like these new "explainer" videos you have been doing with deep dives into each topic : )

    • @MalwareAnalysisForHedgehogs
      @MalwareAnalysisForHedgehogs  3 ปีที่แล้ว +4

      Thank you! Means a lot more to hear it from you than anyone else.
      Also thank you for the coffees. Now I don't have any hand free for typing anymore ... ;)

  • @duckydev9427
    @duckydev9427 3 ปีที่แล้ว +1

    This video covers only the surface - throughout the past months my mind has opened to so many new techniques that you would never imagine.

  • @atfghndhri
    @atfghndhri 4 หลายเดือนก่อน +1

    Good job, the visual parts and the explanations were so helpful. 🙏

  • @novianindy887
    @novianindy887 หลายเดือนก่อน

    u use c or c++ ?

  • @hariharasudhan6107
    @hariharasudhan6107 ปีที่แล้ว

    This is such a wonderful work and an awesome explanation. Thanks for this!!

  • @ashwinkumar6940
    @ashwinkumar6940 ปีที่แล้ว

    Such as great explanation with sort of API's in easy way. great effort.. "claps" for your work

  • @martinheidegger3028
    @martinheidegger3028 3 ปีที่แล้ว +2

    What is the stealthiest process injection method in you opinion? (Even the ones not included in this video)
    Thx!

    • @MalwareAnalysisForHedgehogs
      @MalwareAnalysisForHedgehogs  3 ปีที่แล้ว +5

      Generally the ones that are the least well-known. If you don't know what to look for, you won't see it, nor will developers include it into AV products.

  • @Thomas-bf8ob
    @Thomas-bf8ob 3 ปีที่แล้ว +1

    It's a shame there's no discord in the description, I know a couple more ways to do process injection that I would be happy to share with you! (Some don't even require a handle)
    All in all it's a really good video and way to explain them, I'm impressed by your research as I did the same..
    Nice video as always :)

    • @MalwareAnalysisForHedgehogs
      @MalwareAnalysisForHedgehogs  3 ปีที่แล้ว +1

      Thank you for your feedback. Sure, you can show me some techniques. I am aware that this does not show all injection techniques. Just the most common ones I see in malware. Maybe you have found some I don't know yet, so I would be happy to know. :)
      You can DM me on Twitter (@struppigel) or write me on portx@gmx.de

    • @_zproxy
      @_zproxy 3 ปีที่แล้ว

      @@MalwareAnalysisForHedgehogs whatof gab?

  • @kodersk8
    @kodersk8 2 ปีที่แล้ว

    very well explained

  • @spidertube1000
    @spidertube1000 11 หลายเดือนก่อน

    What about stack bombing and herpaderping

  • @rhywive
    @rhywive ปีที่แล้ว

    very good video, thank you

  • @marcospill8678
    @marcospill8678 3 ปีที่แล้ว

    Awesome video. I still have one or two questions. You'll have to explain it to me at the next meeting :-)

  • @avaze7
    @avaze7 2 ปีที่แล้ว +1

    I'm currently learning a bit about Win32 Programming and I find it hilarious that all these injection types have dedicated functions to execute them, I always thought you'd have to do a lot of trickery to do something like that. Also, is there no windows built-in security check that prevents you from easily writing to another processes' memory? Or is that only done by AV's?

    • @MalwareAnalysisForHedgehogs
      @MalwareAnalysisForHedgehogs  2 ปีที่แล้ว +2

      These functions are an overview for malware analysts, so you can recognize these and know where to put breakpoints for unpacking the injected code.
      Depending on the technique used there can be more complicated stuff involved than just calling these functions. E.g. check out the article on AtomBombing which describes that it needs ROP chaining, among others.
      There are several security mechanisms that can prevent injection in processes, especially such processes that would grant more rights. But there is not much that holds a malware back from injecting into its own child process (what they often do as a means to execute encrypted code dynamically, so they are just packed).
      Some security mechanisms that might be relevant are ASLR, data execution prevention (DEP), Mandatory Integrity Control, AppContainer, code enclaves, trustlets.

  • @raghuram8876
    @raghuram8876 3 ปีที่แล้ว +1

    Nice explanation 👌👌👌 Need a video on PE file structure

  • @0xca733
    @0xca733 3 ปีที่แล้ว

    Wow. This is amazing! Thanks for making this :)

  • @dabicao6747
    @dabicao6747 3 ปีที่แล้ว +1

    How can I learn malware analysis

    • @MalwareAnalysisForHedgehogs
      @MalwareAnalysisForHedgehogs  3 ปีที่แล้ว +3

      I recommend working through the book "Practical Malware Analysis" by Honig and Sikorsky

    • @dabicao6747
      @dabicao6747 3 ปีที่แล้ว

      @@MalwareAnalysisForHedgehogs You can recommend some tutorials to me?

    • @MalwareAnalysisForHedgehogs
      @MalwareAnalysisForHedgehogs  3 ปีที่แล้ว +2

      @@dabicao6747 Try lena's reverse engineering tutorials.

  • @computerunderground2458
    @computerunderground2458 2 ปีที่แล้ว +1

    Now I feel so stupid, nice video!

  • @tahirtaht5346
    @tahirtaht5346 3 ปีที่แล้ว

    Awesome

  • @lifeisbeautiful5998
    @lifeisbeautiful5998 3 ปีที่แล้ว

    How to remove a rat , heur or backdoors from a sofware or exe.

  • @shaggy6249
    @shaggy6249 2 หลายเดือนก่อน

    Good video but hard to follow with the hand written notes

  • @fikrahack
    @fikrahack 3 ปีที่แล้ว

    Thnx bro yoooooooou best

  • @Ocean7653
    @Ocean7653 4 หลายเดือนก่อน

    The handwritten text discouraged me from going in more than 2 minutes

    • @MalwareAnalysisForHedgehogs
      @MalwareAnalysisForHedgehogs  4 หลายเดือนก่อน

      Thank you for your feedback. Yes, the presentation is not really good. This video is a few years old, I hope the current ones are a little better.

  • @SolusArcticWolf
    @SolusArcticWolf ปีที่แล้ว

    No, no no.. horrible squiqles for a diagram.. and you also assumed we already have knowledge about the basic terms.