The sub-techniques beta is now live! Read the release blog post for more info.


Windows processes often leverage application programming interface (API) functions to perform tasks that require reusable system resources. Windows API functions are typically stored in dynamic-link libraries (DLLs) as exported functions.

Hooking involves redirecting calls to these functions and can be implemented via:

  • Hooks procedures, which intercept and execute designated code in response to events such as messages, keystrokes, and mouse inputs. [1] [2]
  • Import address table (IAT) hooking, which use modifications to a process’s IAT, where pointers to imported API functions are stored. [2] [3] [4]
  • Inline hooking, which overwrites the first bytes in an API function to redirect code flow. [2] [5] [4]

Similar to Process Injection, adversaries may use hooking to load and execute malicious code within the context of another process, masking the execution while also allowing access to the process's memory and possibly elevated privileges. Installing hooking mechanisms may also provide Persistence via continuous invocation when the functions are called through normal use.

Malicious hooking mechanisms may also capture API calls that include parameters that reveal user authentication credentials for Credential Access. [6]

Hooking is commonly utilized by Rootkits to conceal files, processes, Registry keys, and other objects in order to hide malware and associated behaviors. [7]

ID: T1179
Tactic: Persistence, Privilege Escalation, Credential Access
Platform: Windows
Permissions Required: Administrator, SYSTEM
Data Sources: API monitoring, Binary file metadata, DLL monitoring, Loaded DLLs, Process monitoring, Windows event logs
Version: 1.0
Created: 16 January 2018
Last Modified: 03 April 2019

Procedure Examples

Name Description

Empire contains some modules that leverage API hooking to carry out tasks, such as netripper.[8]


FinFisher hooks processes by modifying IAT pointers to CreateWindowEx.[9][2]


NOKKI uses the Windows call SetWindowsHookEx and begins injecting it into every GUI process running on the victim's machine.[10]


PLATINUM is capable of using Windows hook interfaces for information gathering such as credential access.[17]


RDFSNIFFER hooks several Win32 API functions to hijack elements of the remote system management user-interface.[16]


TrickBot has the ability to capture RDP credentials by capturing the CredEnumerateA API [13]


Ursnif has hooked APIs to perform a wide variety of information theft, such as monitoring traffic from browsers.[14]


Zebrocy installs an application-defined Windows hook to get notified when a network drive has been attached, so it can then use the hook to call its RecordToFile file stealing method.[11]

Zeus Panda

Zeus Panda hooks processes by leveraging its own IAT hooked functions.[12]


ZxShell hooks several API functions to spawn system threads. [15]


This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.


Monitor for calls to the SetWindowsHookEx and SetWinEventHook functions, which install a hook procedure. [1] [18] Also consider analyzing hook chains (which hold pointers to hook procedures for each type of hook) using tools [18] [19] [20] or by programmatically examining internal kernel structures. [21] [22]

Rootkits detectors [23] can also be used to monitor for various flavors of hooking activity.

Verify integrity of live processes by comparing code in memory to that of corresponding static binaries, specifically checking for jumps and other instructions that redirect code flow. Also consider taking snapshots of newly started processes [24] to compare the in-memory IAT to the real addresses of the referenced functions. [25] [3]

Analyze process behavior to determine if a process is performing actions it usually does not, such as opening network connections, reading files, or other suspicious actions that could relate to post-compromise behavior.