Waiting Thread Hijacking: A Stealthier Version of Thread Execution Hijacking
Common Information
Type Value
UUID 100c7d54-a0fb-4d66-9699-2af01b3b35a2
Fingerprint e63c011fb8281440
Analysis status DONE
Considered CTI value 1
Text language
Published April 14, 2025, 4:05 p.m.
Added to db April 14, 2025, 6:36 p.m.
Last updated April 17, 2025, 10:20 p.m.
Headline Waiting Thread Hijacking: A Stealthier Version of Thread Execution Hijacking
Title Waiting Thread Hijacking: A Stealthier Version of Thread Execution Hijacking
Detected Hints/Tags/Attributes 67/2/37
RSS Feed
Details Id Enabled Feed title Url Added to db
Details 158 Malware Analysis, News and Indicators - Latest topics https://malware.news/latest.rss 2024-08-30 22:08
Attributes
Details Type #Events CTI Value
Details Domain 6446
github.com
Details Domain 476
attack.mitre.org
Details Domain 10
www.ired.team
Details Domain 4
scorpiosoftware.net
Details Domain 304
learn.microsoft.com
Details Domain 3
www.microsoftpressstore.com
Details Domain 24
www.safebreach.com
Details Domain 38
blackhat.com
Details Domain 2
vvinoth.com
Details Domain 168
research.checkpoint.com
Details File 369
calc.exe
Details File 668
ntdll.dll
Details File 95
kernelbase.dll
Details File 927
kernel32.dll
Details File 2
us-19-kotler-process-injection-techniques-gotta-catch-them-all-wp.pdf
Details File 15
article.aspx
Details File 87
www.safe
Details File 2
eu-23-leviev-the-pool-party-you-will-never-forget.pdf
Details Github username 6
mr-un1k0d3r
Details Github username 40
hasherezade
Details IPv6 5
d::dec
Details MITRE ATT&CK Techniques 525
T1055
Details Url 2
https://github.com/mr-un1k0d3r/edrs
Details Url 2
https://learn.microsoft.com/en-us/windows/win32/procthread/process-security-and-access-rights
Details Url 2
https://github.com/hasherezade/waiting_thread_hijacking
Details Url 2
https://i.blackhat.com/usa-19/thursday/us-19-kotler-process-injection-techniques-gotta-catch-them-all-wp.pdf
Details Url 3
https://www.elastic.co/blog/ten-process-injection-techniques-technical-survey-common-and-trending-process
Details Url 10
https://attack.mitre.org/techniques/t1055
Details Url 2
https://www.ired.team/offensive-security/code-injection-process-injection
Details Url 2
https://www.ired.team/offensive-security/code-injection-process-injection/injecting-to-remote-process-via-thread-hijacking
Details Url 2
https://scorpiosoftware.net/2022/03/21/threads-threads-and-more-threads
Details Url 2
https://learn.microsoft.com/en-us/windows/win32/procthread/thread-pools
Details Url 2
https://www.microsoftpressstore.com/articles/article.aspx?p=2233328&seqnum=6
Details Url 3
https://www.safebreach.com/blog/process-injection-using-windows-thread-pools
Details Url 2
https://i.blackhat.com/eu-23/presentations/eu-23-leviev-the-pool-party-you-will-never-forget.pdf
Details Url 2
https://vvinoth.com/post/threadpools
Details Url 1
https://research.checkpoint.com/2025/waiting-thread-hijacking