detecting-process-injection-techniques

Installation
SKILL.md

Detecting Process Injection Techniques

When to Use

  • EDR alerts on suspicious API call sequences (VirtualAllocEx + WriteProcessMemory + CreateRemoteThread)
  • A legitimate process (explorer.exe, svchost.exe) exhibits unexpected network connections or file operations
  • Memory forensics reveals executable code in memory regions that should not contain it
  • Investigating living-off-the-land attacks where malware hides inside trusted processes
  • Building detection logic for specific injection techniques in EDR or SIEM rules

Do not use for standard DLL loading analysis; injection implies unauthorized code placement in a process without that process's cooperation.

Prerequisites

  • Volatility 3 for memory forensics analysis of injection artifacts
  • Sysmon configured with Event IDs 8 (CreateRemoteThread) and 10 (ProcessAccess)
  • API Monitor or x64dbg for observing injection API calls in real-time
  • Process Hacker or Process Explorer for inspecting process memory regions
  • Understanding of Windows memory management (VirtualAlloc, VAD, page protections)
Related skills
Installs
8
GitHub Stars
6.2K
First Seen
Mar 18, 2026