Understanding Process Injection: An In-Depth Analysis
Tags
Common Information
Type | Value |
---|---|
UUID | f13be23d-04c1-49e4-8509-1d2f5dc9555a |
Fingerprint | bf289d351ce04481 |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | June 27, 2023, 1:59 a.m. |
Added to db | June 27, 2023, 4:30 a.m. |
Last updated | Nov. 6, 2024, 11:08 a.m. |
Headline | Understanding Process Injection: An In-Depth Analysis |
Title | Understanding Process Injection: An In-Depth Analysis |
Detected Hints/Tags/Attributes | 26/2/6 |
Source URLs
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 171 | ✔ | Malware on Medium | https://medium.com/feed/tag/malware | 2024-08-30 22:08 |
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 281 | docs.microsoft.com |
|
Details | File | 7 | process.pl |
|
Details | Url | 1 | https://docs.microsoft.com/en-us/windows/win32/api/processthreadsapi/nf-processthreadsapi-openprocess |
|
Details | Url | 1 | https://docs.microsoft.com/en-us/windows/win32/api/memoryapi/nf-memoryapi-virtualallocex |
|
Details | Url | 1 | https://docs.microsoft.com/en-us/windows/win32/api/memoryapi/nf-memoryapi-writeprocessmemory |
|
Details | Url | 1 | https://docs.microsoft.com/en-us/windows/win32/api/processthreadsapi/nf-processthreadsapi-createremotethread |