skip to content
Decrypt LOL

Get Cyber-Smart in Just 5 Minutes a Week

Decrypt delivers quick and insightful updates on cybersecurity. No spam, no data sharing—just the info you need to stay secure.

Read the latest edition

Malware Technique: Process Injection via Shared Memory Sections

/ 1 min read

🧠💻 Malware Techniques: Process Injection via Shared Memory Sections Explained. The article delves into a sophisticated malware technique that utilizes Windows Section Objects for code injection into remote processes. By creating a shared memory region, attackers can copy shellcode into this space, which is then accessible to multiple processes. The process involves using the Windows API functions NtCreateSection and NtMapViewOfSection to establish and manipulate memory views, allowing the malicious code to execute within the target process. Demonstrations in C and C# illustrate the method, highlighting the importance of permissions for successful execution. The article also notes the necessity of using appropriate shellcode and the potential for various memory layouts across different processes.

Source
{entry.data.source.title}
Original