Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up

A ProcInjectionsFind volatility plugin runs against malware-infected memory images or memory of live VMs and examines each memory region of all running processes to conclude if it is the result of process injection.

NotificationsYou must be signed in to change notification settings

darshantank/ProcInjectionsFind

Repository files navigation

A ProcInjectionsFind volatility plugin runs against malware-infected memory images or memory of live VMs and examines each memory region of all running processes to conclude if it is the result of process injection.

The ProcInjectionsFind volatility module is designed to automate the identification of different process injection strategies.

Although there are numerous process injection techniques, this work focuses on the detection of following eight different implementations of process injection:

1. Remote DLL Injection Via CreateRemoteThread and LoadLibrary2. Remote Thread Injection Using CreateRemoteThread3. Portable Executable Injection4. Reflective DLL Injection5. Hollow Process Injection6. Thread Execution Hijacking 7. APC Injection 8. AtomBombing

This module runs a few checks to pinpoint malicious/injected memory sections and prints various attributes of each injected memory area that match our rules characterized in the algorithms.

One can perform live introspection of running VMs for possible indication of process injection.

Our targeted operating systems are Windows-based, i.e., Windows 7, Windows 8.1 and Windows 10 respectively.

The proposed system completely detects more malware families and stands over other systems in all evaluation metrics defined in this work.

We are leveraging virtual machine introspection with memory forensics to detect process injection of varied types in a virtualized environment.

On any questions (regarding this research ;-) ) don't hesitate to contactdmtank@gmail.com

About

A ProcInjectionsFind volatility plugin runs against malware-infected memory images or memory of live VMs and examines each memory region of all running processes to conclude if it is the result of process injection.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages


[8]ページ先頭

©2009-2025 Movatter.jp