detecting-t1055-process-injection-with-sysmon

Installation
SKILL.md

Detecting T1055 Process Injection with Sysmon

When to Use

  • When hunting for defense evasion techniques that hide malicious code inside legitimate processes
  • After EDR alerts for suspicious cross-process memory access or remote thread creation
  • When investigating malware that injects into svchost.exe, explorer.exe, or other system processes
  • During purple team exercises testing detection of process injection variants
  • When validating Sysmon configuration coverage for injection detection

Prerequisites

  • Sysmon deployed with comprehensive configuration capturing Events 1, 7, 8, 10, 25
  • Event ID 8 (CreateRemoteThread) enabled for remote thread detection
  • Event ID 10 (ProcessAccess) configured with appropriate access mask filters
  • Event ID 7 (ImageLoaded) for DLL injection detection
  • Event ID 25 (ProcessTampering) for process hollowing on Sysmon 13+
  • SIEM platform for correlation and alerting
Related skills
Installs
5
GitHub Stars
6.2K
First Seen
Mar 18, 2026