reevesrs24 / EvasiveProcessHollowing

Evasive Process Hollowing Techniques
134 stars 33 forks source link
injection malware

EvasiveProcessHollowing

Evasive Process Hollowing PoC

Proof of concept code which demonstrate a few of the "evasive process hollowing" techniques analyzed in the white paper "What Malware Authors Don't want you to know - Evasive Hollow Process Injection" written by Monnappa K A. The PoC code can be used as a testbed to replicate the memory forensics findings discussed in the white paper.

2. Process Hollowing - Allocation in a different address and PEB modification w/o process hollowing

PoC: HollowProcessInjection2

3. Process Hollowing - Address of Entry point Modification w/ changing the Memory Protection to PAGE_EXECUTE_WRITECOPY

PoC: HollowProcessInjection3

Sources:

What Malware Authors Don't want you to know - Evasive Hollow Process Injection\ Process Hollowing - John Leitch\ Hasherezade - pe_to_shellcode