Media Summary: Forget standard DLL Injection. Dropping files to disk is the easiest way to get caught by modern EDRs. Welcome back to Suit Up ... In this video I explain and demonstrate a concept called Episode 4 takes a deep, cinematic dive into the advanced architecture of an infection. We move beyond basic

Malware Analysis Process Hollowing - Detailed Analysis & Overview

Forget standard DLL Injection. Dropping files to disk is the easiest way to get caught by modern EDRs. Welcome back to Suit Up ... In this video I explain and demonstrate a concept called Episode 4 takes a deep, cinematic dive into the advanced architecture of an infection. We move beyond basic This is an overview to common process injection techniques used by The newest ROKRAT variant injects its shellcode into cmd.exe, which will in turn decrypt a PE image. We debug the injected code ... Welcome to a dedicated deep-dive explainer in our

We analyse a hook injection PoC by Robert Kuster and partially fix it for Windows 7. This Video is a follow-up on The Unpacking Of Osiris, Covering how the Dropper used a Hybrid of Lenny Zeltser, Instructor / VP of Products, Minerva Labs & SANS Knowing how to In this video we'll see an interesting technique to perform This channel practice the contents presented in Book

Photo Gallery

Process Hollowing: The Malware Technique EDRs Can't Detect
Malware Analysis - Process Hollowing
What is Process Hollowing?
Reversing Malicious Code: Process Hollowing & API Hooking | Masterclass Ep. 4
process hollowing demo
Malware Theory - Process Injection
Hunting Process Injection - Memory Analysis - Process Hollowing
Malware Analysis - Code Injection via CreateRemoteThread & WriteProcessMemory
DEMO: Process Hollowing from Word Document
Malware Analysis - ROKRAT Unpacking from Injected Shellcode
The Explainer: Dissecting Process Hollowing | Masterclass Ep. 4.1
Malware Analysis - Hook Injection PoC by Robert Kuster
View Detailed Profile
Process Hollowing: The Malware Technique EDRs Can't Detect

Process Hollowing: The Malware Technique EDRs Can't Detect

Forget standard DLL Injection. Dropping files to disk is the easiest way to get caught by modern EDRs. Welcome back to Suit Up ...

Malware Analysis - Process Hollowing

Malware Analysis - Process Hollowing

We unpack a Dridex sample that uses

What is Process Hollowing?

What is Process Hollowing?

In this video I explain and demonstrate a concept called

Reversing Malicious Code: Process Hollowing & API Hooking | Masterclass Ep. 4

Reversing Malicious Code: Process Hollowing & API Hooking | Masterclass Ep. 4

Episode 4 takes a deep, cinematic dive into the advanced architecture of an infection. We move beyond basic

process hollowing demo

process hollowing demo

process hollowing demo

Malware Theory - Process Injection

Malware Theory - Process Injection

This is an overview to common process injection techniques used by

Hunting Process Injection - Memory Analysis - Process Hollowing

Hunting Process Injection - Memory Analysis - Process Hollowing

Hunting

Malware Analysis - Code Injection via CreateRemoteThread & WriteProcessMemory

Malware Analysis - Code Injection via CreateRemoteThread & WriteProcessMemory

We take a look into the

DEMO: Process Hollowing from Word Document

DEMO: Process Hollowing from Word Document

Does not include any

Malware Analysis - ROKRAT Unpacking from Injected Shellcode

Malware Analysis - ROKRAT Unpacking from Injected Shellcode

The newest ROKRAT variant injects its shellcode into cmd.exe, which will in turn decrypt a PE image. We debug the injected code ...

The Explainer: Dissecting Process Hollowing | Masterclass Ep. 4.1

The Explainer: Dissecting Process Hollowing | Masterclass Ep. 4.1

Welcome to a dedicated deep-dive explainer in our

Malware Analysis - Hook Injection PoC by Robert Kuster

Malware Analysis - Hook Injection PoC by Robert Kuster

We analyse a hook injection PoC by Robert Kuster and partially fix it for Windows 7.

Reverse Engineering: Process Hollowing | Process Doppelgang-ing Hybrid used by The Osiris Dropper

Reverse Engineering: Process Hollowing | Process Doppelgang-ing Hybrid used by The Osiris Dropper

This Video is a follow-up on The Unpacking Of Osiris, Covering how the Dropper used a Hybrid of

Process hollowing and Microsoft Defender detection

Process hollowing and Microsoft Defender detection

Test and customise a C implementation of

Process Hollowing Demo

Process Hollowing Demo

To Understand how

Process Hollowing - PoC Demonstration

Process Hollowing - PoC Demonstration

Process hollowing

Practical Malware Analysis Essentials for Incident Responders

Practical Malware Analysis Essentials for Incident Responders

Lenny Zeltser, Instructor / VP of Products, Minerva Labs & SANS Knowing how to

Learn Malware Analysis with Process Hollowing - How to perform and detect

Learn Malware Analysis with Process Hollowing - How to perform and detect

In this video we'll see an interesting technique to perform

Process Hollowing and shell code injection presentation

Process Hollowing and shell code injection presentation

This channel practice the contents presented in Book