Malware Theory - Process Injection

  Рет қаралды 25,460

MalwareAnalysisForHedgehogs

MalwareAnalysisForHedgehogs

Күн бұрын

Пікірлер: 40
@MalwareAnalysisForHedgehogs
@MalwareAnalysisForHedgehogs 3 жыл бұрын
This is an overview to all common process injection techniques used by malware, including AtomBombing, Process Hollowing aka RunPE, Process Doppelgänging. Buy me a coffee: ko-fi.com/struppigel Follow me on Twitter: twitter.com/struppigel My process Injection overview infographic: struppigel.blogspot.com/2017/07/process-injection-info-graphic.html Process Injection Techniques Gotta Catch Them All: i.blackhat.com/USA-19/Thursday/us-19-Kotler-Process-Injection-Techniques-Gotta-Catch-Them-All.pdf Atom bombing: www.fortinet.com/blog/threat-research/atombombing-brand-new-code-injection-technique-for-windows Atom bombing: www.enisa.europa.eu/publications/info-notes/atombombing-2013-a-new-code-injection-attack Process Doppelgänging: hshrzd.wordpress.com/2017/12/18/process-doppelganging-a-new-way-to-impersonate-a-process/ Hasherezade's video on creating the illusion of executing a TXT file: kzbin.info/www/bejne/jp66gJ1jmMucrtU DLL injection en.wikipedia.org/wiki/DLL_injection DLL Injection via LoadLibrary/CreateRemoteThread: www.codeproject.com/Articles/4610/Three-Ways-to-Inject-Your-Code-into-Another-Proces DLL Search Order Hijacking (DLL injection that is not process injection): dmcxblue.gitbook.io/red-team-notes/persistence/dll-search-order-hijacking Backdooring PE files with shellcode (code injection that is not process injection): www.ired.team/offensive-security/code-injection-process-injection/backdooring-portable-executables-pe-with-shellcode
@OALABS
@OALABS 3 жыл бұрын
This is a fantastic diagram for explaining how things work, I wish I had though of this! I really like these new "explainer" videos you have been doing with deep dives into each topic : )
@MalwareAnalysisForHedgehogs
@MalwareAnalysisForHedgehogs 3 жыл бұрын
Thank you! Means a lot more to hear it from you than anyone else. Also thank you for the coffees. Now I don't have any hand free for typing anymore ... ;)
@duckydev9427
@duckydev9427 3 жыл бұрын
This video covers only the surface - throughout the past months my mind has opened to so many new techniques that you would never imagine.
@atfghndhri
@atfghndhri 4 ай бұрын
Good job, the visual parts and the explanations were so helpful. 🙏
@MalwareAnalysisForHedgehogs
@MalwareAnalysisForHedgehogs 4 ай бұрын
Thank you.
@hariharasudhan6107
@hariharasudhan6107 Жыл бұрын
This is such a wonderful work and an awesome explanation. Thanks for this!!
@ashwinkumar6940
@ashwinkumar6940 Жыл бұрын
Such as great explanation with sort of API's in easy way. great effort.. "claps" for your work
@novianindy887
@novianindy887 Ай бұрын
u use c or c++ ?
@avaze7
@avaze7 2 жыл бұрын
I'm currently learning a bit about Win32 Programming and I find it hilarious that all these injection types have dedicated functions to execute them, I always thought you'd have to do a lot of trickery to do something like that. Also, is there no windows built-in security check that prevents you from easily writing to another processes' memory? Or is that only done by AV's?
@MalwareAnalysisForHedgehogs
@MalwareAnalysisForHedgehogs 2 жыл бұрын
These functions are an overview for malware analysts, so you can recognize these and know where to put breakpoints for unpacking the injected code. Depending on the technique used there can be more complicated stuff involved than just calling these functions. E.g. check out the article on AtomBombing which describes that it needs ROP chaining, among others. There are several security mechanisms that can prevent injection in processes, especially such processes that would grant more rights. But there is not much that holds a malware back from injecting into its own child process (what they often do as a means to execute encrypted code dynamically, so they are just packed). Some security mechanisms that might be relevant are ASLR, data execution prevention (DEP), Mandatory Integrity Control, AppContainer, code enclaves, trustlets.
@Thomas-bf8ob
@Thomas-bf8ob 3 жыл бұрын
It's a shame there's no discord in the description, I know a couple more ways to do process injection that I would be happy to share with you! (Some don't even require a handle) All in all it's a really good video and way to explain them, I'm impressed by your research as I did the same.. Nice video as always :)
@MalwareAnalysisForHedgehogs
@MalwareAnalysisForHedgehogs 3 жыл бұрын
Thank you for your feedback. Sure, you can show me some techniques. I am aware that this does not show all injection techniques. Just the most common ones I see in malware. Maybe you have found some I don't know yet, so I would be happy to know. :) You can DM me on Twitter (@struppigel) or write me on portx@gmx.de
@_zproxy
@_zproxy 3 жыл бұрын
@@MalwareAnalysisForHedgehogs whatof gab?
@kodersk8
@kodersk8 2 жыл бұрын
very well explained
@MalwareAnalysisForHedgehogs
@MalwareAnalysisForHedgehogs 2 жыл бұрын
Thanks!
@martinheidegger3028
@martinheidegger3028 3 жыл бұрын
What is the stealthiest process injection method in you opinion? (Even the ones not included in this video) Thx!
@MalwareAnalysisForHedgehogs
@MalwareAnalysisForHedgehogs 3 жыл бұрын
Generally the ones that are the least well-known. If you don't know what to look for, you won't see it, nor will developers include it into AV products.
@marcospill8678
@marcospill8678 3 жыл бұрын
Awesome video. I still have one or two questions. You'll have to explain it to me at the next meeting :-)
@rhywive
@rhywive Жыл бұрын
very good video, thank you
@spidertube1000
@spidertube1000 11 ай бұрын
What about stack bombing and herpaderping
@0xca733
@0xca733 3 жыл бұрын
Wow. This is amazing! Thanks for making this :)
@computerunderground2458
@computerunderground2458 2 жыл бұрын
Now I feel so stupid, nice video!
@raghuram8876
@raghuram8876 3 жыл бұрын
Nice explanation 👌👌👌 Need a video on PE file structure
@MalwareAnalysisForHedgehogs
@MalwareAnalysisForHedgehogs 3 жыл бұрын
I made one here: kzbin.info/www/bejne/omeqm4hum9Jrqa8
@lifeisbeautiful5998
@lifeisbeautiful5998 3 жыл бұрын
How to remove a rat , heur or backdoors from a sofware or exe.
@dabicao6747
@dabicao6747 3 жыл бұрын
How can I learn malware analysis
@MalwareAnalysisForHedgehogs
@MalwareAnalysisForHedgehogs 3 жыл бұрын
I recommend working through the book "Practical Malware Analysis" by Honig and Sikorsky
@dabicao6747
@dabicao6747 3 жыл бұрын
@@MalwareAnalysisForHedgehogs You can recommend some tutorials to me?
@MalwareAnalysisForHedgehogs
@MalwareAnalysisForHedgehogs 3 жыл бұрын
@@dabicao6747 Try lena's reverse engineering tutorials.
@shaggy6249
@shaggy6249 2 ай бұрын
Good video but hard to follow with the hand written notes
@MalwareAnalysisForHedgehogs
@MalwareAnalysisForHedgehogs 2 ай бұрын
You are right, thank you for the feedback, I will do better :)
@tahirtaht5346
@tahirtaht5346 3 жыл бұрын
Awesome
@fikrahack
@fikrahack 3 жыл бұрын
Thnx bro yoooooooou best
@Ocean7653
@Ocean7653 4 ай бұрын
The handwritten text discouraged me from going in more than 2 minutes
@MalwareAnalysisForHedgehogs
@MalwareAnalysisForHedgehogs 4 ай бұрын
Thank you for your feedback. Yes, the presentation is not really good. This video is a few years old, I hope the current ones are a little better.
@SolusArcticWolf
@SolusArcticWolf Жыл бұрын
No, no no.. horrible squiqles for a diagram.. and you also assumed we already have knowledge about the basic terms.
@MalwareAnalysisForHedgehogs
@MalwareAnalysisForHedgehogs Жыл бұрын
You are right. I will do it better for the next videos. :)
All About DLL Hijacking - My Favorite Persistence Method
20:23
Process Injection & Hollowing Explained | TryHackMe Abusing Windows Internals P1
22:09
Motasem Hamdan | Cyber Security & Tech
Рет қаралды 1,7 М.
А я думаю что за звук такой знакомый? 😂😂😂
00:15
Денис Кукояка
Рет қаралды 4,1 МЛН
When u fight over the armrest
00:41
Adam W
Рет қаралды 32 МЛН
How to make your malware HARD to detect
17:21
Mitch Edwards (@valhalla_dev)
Рет қаралды 9 М.
Process Injection Techniques: Deep Dive into Process Hollowing & Shellcode
1:32:48
ATT&CK Deep Dive: Process Injection
1:05:08
Red Canary
Рет қаралды 10 М.
Malware Theory - How Packers Work, Polymorphism and Misconceptions
14:00
MalwareAnalysisForHedgehogs
Рет қаралды 6 М.
Malware development 101: Creating your first ever MALWARE
28:00
Leet Cipher
Рет қаралды 386 М.
I Made Malware In Under 20 Minutes
19:44
John Hammond
Рет қаралды 73 М.
Arbitrary Code Execution in Animal Crossing
24:22
Hunter R.
Рет қаралды 339 М.
Malware 101: Injection Basics - Local Shellcode Injection
9:21
AhmedS Kasmani
Рет қаралды 1,1 М.
Malware Analysis - Writing x64dbg unpacking scripts
20:51
MalwareAnalysisForHedgehogs
Рет қаралды 1,2 М.