Changes made to a running process, such as writing data into memory, modifying execution behavior, or injecting code into an existing process. Adversaries frequently modify processes to execute malicious payloads, evade detection, or gain escalated privileges.
Data Collection Measures:
| Name | Channel |
|---|---|
| auditd:memprotect | change from PROT_READ|PROT_WRITE to PROT_EXEC |
| auditd:SYSCALL | rename, chmod |
| auditd:SYSCALL | mprotect |
| auditd:SYSCALL | kill syscalls targeting auditd process |
| auditd:SYSCALL | open, rename |
| auditd:SYSCALL | SYSCALL ptrace/mprotect |
| auditd:SYSCALL | rename |
| ebpf:tracepoints | Runtime memory overwrite of argv[] memory region |
| etw:Microsoft-Windows-Kernel-Process | Memory Modification / Unmapped module load or suspicious RWX allocations in the process space of a browser process |
| linux:osquery | Detection of bitwise operations or custom encryption functions in memory traces |
| linux:procfs | /proc/[pid]/maps, /proc/[pid]/mem |
| macos:endpointsecurity | ES_EVENT_MMAP |
| macos:endpointsecurity | ES_EVENT_TYPE_NOTIFY_MMAP |
| macos:osquery | Memory Mappings |
| macos:unifiedlog | memory mapping |
| macos:unifiedlog | Anomalous dyld dynamic library loads or RWX memory mappings in browser process |
| macos:unifiedlog | process, library load, memory operations |
| macos:unifiedlog | Abnormal memory operations (XOR/bitwise loops) during archive generation |
| WinEventLog:Sysmon | EventCode=8 |