Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Techniques
  3. Enterprise
  4. Access Token Manipulation
  5. Parent PID Spoofing

Access Token Manipulation: Parent PID Spoofing

Adversaries may spoof the parent process identifier (PPID) of a new process to evade process-monitoring defenses or to elevate privileges. New processes are typically spawned directly from their parent, or calling, process unless explicitly specified. One way of explicitly assigning the PPID of a new process is via theCreateProcess API call, which supports a parameter that defines the PPID to use.[1] This functionality is used by Windows features such as User Account Control (UAC) to correctly set the PPID after a requested elevated process is spawned by SYSTEM (typically viasvchost.exe orconsent.exe) rather than the current user context.[2]

Adversaries may abuse these mechanisms to evade defenses, such as those blocking processes spawning directly from Office documents, and analysis targeting unusual/potentially malicious parent-child process relationships, such as spoofing the PPID ofPowerShell/Rundll32 to beexplorer.exe rather than an Office document delivered as part ofSpearphishing Attachment.[3] This spoofing could be executed viaVisual Basic within a malicious Office document or any code that can performNative API.[4][3]

Explicitly assigning the PPID may also enable elevated privileges given appropriate access rights to the parent process. For example, an adversary in a privileged user context (i.e. administrator) may spawn a new process and assign the parent as a process running as SYSTEM (such aslsass.exe), causing the new process to be elevated via the inherited access token.[5]

ID: T1134.004
Sub-technique of: T1134
Platforms: Windows
Contributors: Wayne Silva, F-Secure Countercept
Version: 1.1
Created: 18 February 2020
Last Modified: 24 October 2025

Procedure Examples

IDNameDescription
S0154 Cobalt Strike

Cobalt Strike can spawn processes with alternate PPIDs.[6][7]

S1111 DarkGate

DarkGate relies on parent PID spoofing as part of its "rootkit-like" functionality to evade detection via Task Manager or Process Explorer.[8]

S0356 KONNI

KONNI has used parent PID spoofing to spawn a newcmd process usingCreateProcessW and a handle toTaskmgr.exe.[9]

S0501 PipeMon

PipeMon can use parent PID spoofing to elevate privileges.[10]

Mitigations

This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.

Detection Strategy

IDNameAnalytic IDAnalytic Description
DET0489Behavior-chain detection for T1134.004 Access Token Manipulation: Parent PID Spoofing (Windows)AN1351

A process explicitly forges its parent using EXTENDED_STARTUPINFO + PROC_THREAD_ATTRIBUTE_PARENT_PROCESS (UpdateProcThreadAttribute → CreateProcess[A/W]/CreateProcessAsUserW) or other Native API paths, resulting inmismatched/implausible lineage across ETW EventHeader ProcessId, Security 4688 Creator Process ID/Name, and sysmon ParentProcessGuid. Often paired with privilege escalation when the chosen parent runs as SYSTEM.

References

×

[8]ページ先頭

©2009-2026 Movatter.jp